node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
10,286
1
List_of_relational_database_management_systems:list relational database management systems list relational database management systems
[ 6147, 4614, 5640, 8201, 4106, 1549, 2068, 7191, 3096, 1049, 5658, 9248, 10793, 1579, 3641, 11324, 9286, 2632, 9290, 8788, 10326, 7767, 4696, 1636, 9828, 5734, 10340, 8808, 2669, 1146, 6780, 3196, 9360, 10899, 8340, 10389, 4255, 9893, 2727, ...
None
10,287
3
Galaxian:galaxian galaxian designed kazunori sawano worked many namco electro-mechanical shooting gallery games programmed kōichi tashiro namco set capitalize success taito space invaders massive impact video game market proving critical financial success although first video game galaxian popularized use rgb colorful enemy designs well use short jingles scrolling backgrounds one company first video games exported outside japan thanks licensing deal midway games galaxian proved critical commercial success upon release many applauding improvements invader -type games innovations 1982 sold 40,000 arcade units north america alone japan proved success pac-man followed long series sequels spin-offs multiple platforms — first galaga would usurp original popularity recognized one greatest video games time original ported numerous game consoles including atari 2600 msx family computer included multiple namco video game compilations cited one influential important video games shoot'em genre galaxian fixed shooter video game player controls starship called galaxip objective clear round aliens enemies appear formation towards top screen two escort ships labeled galaxian flagship galboss enemies make divebomb towards bottom screen shooting projectiles attempt hit player galaxip fire single shot on-screen must wait hit top able fire another due limitations hardware flagships make divebomb two red escort ships shooting three award player bonus points extra points awarded destruction flagship enemy movement increase game progresses alongside number shots enemies fire game attract mode featured short plotline titled galaxians mission destroy aliens rounds indicated small flags bottom screen galaxian designed kazunori sawano previously worked many namco electro-mechanical shooting gallery arcade games notably shoot away 1977 early game development taito released space invaders japan swept country storm helped turn video game industry highly-profitable business help capitalize game success namco president masaya nakamura ordered sawano make best post-invaders game could put vast amount pressure development team although development game lasted six months sawano made several ideas half year production began sawano team set make game anybody could play using simple best motto production — helped trim away large-scale ideas favor game could loop endlessly able use two enemy types alongside space invaders large portion game inspired star wars specifically large-scale space battles sawano wanted replicate feeling space war specifically game sound effects several back-and-forth sound effects made many rejected sawano matching vision game namco first arcade game composed synthesizer game balance important part game sawano want make game suddenly spike difficulty build-up warning development team made number enemies on-screen gradually increased difficulty player progresses becoming noticeable later stages enemies designed personality programmed monitor player movements make attacks based early development sawano envisioned enemies resemble tie fighters star wars save hardware memory processing programmers created tilemap hardware model created set 8x8 pixel tiles — reduced processing memory requirements upwards 64 times compared framebuffer model used space invaders galaxian released namco japan november 1979 following large success namco approached midway games terms releasing game overseas midway previously lost license taito success space invaders west midst trying find new partner releasing games agreed deal released game north america early 1980 — move helped strengthen midway challenged atari leadership market help keep demand game japan namco would license game companies manufacturing cabinets including taito irem galaxian critical commercial success upon release 1982 sold 40,000 arcade units north america japan would outperform pac-man short critics applauded game use true color graphics improving formula established space invaders april 5 1980 issue cashbox noted game colorful attractive cabinet design april 26 issue called earthshaking hit referring true followup space invaders video magazine 1982 reviewed astrocade version galaxian named galactic invasion noting graphics inferior coin-op pc versions praising play-action magnificent compared console versions astrocade version would later awarded certificate merit best arcade-to-home video game translation 4th annual arkie awards 2007 retrospective review sir clive eurogamer labeled masterpiece praising beautifully drawn game graphics intense gameplay historically important game industry home computing weekly 1983 gave spectrum version galaxian 3/5 stars describing well-written version praising graphics fast although flickery softline 1983 criticized atari 8-bit version game shipped rom cartridge raised cost stated game becomes tedious quickly atari inc. published ports galaxian systems—atari 8-bit family atari 2600 atari 5200— 1982-3 three years galaxian appeared arcades year galaga additional ports published atarisoft label apple ii colecovision commodore 64 vic-20 ibm pc zx spectrum ports companies sold msx europe japan nec pc-8801 famicom japan sharp x1 bally astrocade version published galaxian name later changed galactic invasion coleco released stand-alone mini-arcade tabletop version galaxian 1981 along pac-man donkey kong frogger sold three million units combined entex released handheld electronic game called galaxian 2 1981 game called galaxian 2 two-player mode sequel entex galaxian galaxian would spawn long series sequels spin-offs multiple game platforms including arcade hardware home video game systems first galaga released year later 1981 usurping original popularity cited one greatest video games time becoming popular game golden age arcade video games north america followed gaplus 1984 added power-up items juggling-based bonus stages galaga '88 released 1987 published north america atari games featured branching level paths new enemy types multiple endings 1990 namco produced theme-park attraction based series originally presented expo '90 moved namco wonder eggs theme park two years later rail shooter 28 players used lightguns shoot enemies projectiles smaller version arcades released 1992 followed 1996 playstation release japan europe 1995 arcade remake galaga released namco classic collection vol 1 compilation galaga arrangement game added two-player co-operative play boss fights alongside new enemy weapon types ported xbox playstation 2 gamecube 2002 part compilation disk namco museum japan-only medal game spin-off galaxian fever released 2000 part namco shooting medal series following year hasbro interactive released playstation game boy color adding side-scrolling third-person stages core gameplay 2005 playstation portable compilation namco museum battle collection includes remake galaga titled galaga arrangement relation one featured namco classic collection vol 1 game later ported ios devices 2009 renamed galaga remix 2008 namco bandai games released downloadable game xbox 360 playstation 3 galaga legions — game instead twin-stick shooter game score attack modes multiple stages followed 2011 sequel galaga legions dx branded now-defunct namco generations label galaxian included namco museum series collections across several platforms galaxian galaga bundled together game boy release arcade classic 3 galaxian released microsoft windows 1995 part microsoft return arcade game also released part pac-man arcade party 30th anniversary arcade machine game also seen jakks pacific plug play tv game controllers galaxian along galaga gaplus galaga '88 redesigned modernized iphone app compilation called galaga 30th anniversary collection released commemoration event namco bandai super impulse also released stand-alone tiny arcade version galaxian galaxian world record focus many competitive gamers since release famous galaxian rivalry british player gary whelan american perry rodgers faced apollo amusements pompano beach florida usa 6–9 april 2006 whelan held world record 1,114,550 points beaten newcomer aart van vliet netherlands scored 1,653,270 points 27 may 2009 funspot family fun center weirs beach new hampshire usa
[ 11522, 3075, 9093, 6797, 10644, 1060, 9516, 9006, 10544, 10931, 6452, 8010, 10316, 10576, 5717, 8663, 3039, 226, 8937, 2540, 8942, 1776, 4856, 5753 ]
Test
10,288
3
PRIMEHPC_FX10:primehpc fx10 primehpc fx10 supercomputer designed manufactured fujitsu announced 7 november 2011 supercomputing conference primehpc fx10 improved commercialized version k computer first supercomputer obtain 10 pflops linpack benchmark largest configuration primehpc fx10 peak performance 23.2 pflops power consumption 22.4 mw list price us 655.4 million succeeded primehpc fx100 sparc64 xifx processors 2015 first installation primehpc fx10 university tokyo information technology center named oakleaf-fx system peak performance 1.135 pflops consists 4,800 nodes total 76,800 cores 150 tb memory 50 racks oakleaf-fx ordered november 2011 became operational april 2012 june 2012 ranked 18th fastest supercomputer 39th top500 list fastest supercomputers linpack benchmark performance 1.043 pflops june 2012 fujitsu received order republic china central weather bureau first primehpc fx10 sale outside japan system installed 2014 performance 1 pflops addition serving platform high-performance computing primehpc fx10 also intended serve software development platform k computer compatible fujitsu sold several systems k computer software development including 96-node system june 2012 kobe university graduate school informatics 384-node system august 2012 university tokyo institute solid-state physics
[ 10021, 3431, 1480, 823, 4270, 9137, 1399, 2394, 1503 ]
Validation
10,289
2
IBM_Common_User_Access:ibm common user access common user access cua standard user interfaces operating systems computer programs developed ibm first published 1987 part systems application architecture used originally mvs/esa vm/cms os/400 os/2 microsoft windows operating systems parts cua standard implemented programs operating systems including variants unix also used java awt swing ibm wanted standard way interact text-based user interface software whether screen dumb terminal connected mainframe ps/2 vga graphics cua detailed specification set strict rules applications look function aim part bring harmony among dos applications independently implemented different user interfaces examples thus every program learned individually complete user interface memorised sign expertise learned uis dozens applications since novice user facing new program would find existing knowledge similar application either use actively hindrance understanding learned behavior might need unlearned new application detailed cua specification published december 1987 328 pages long similarities apple computer detailed human interface guidelines 139 pages apple hig detailed book specifying software 1984 apple macintosh computer look function first written mac new graphical user interface gui software novelty apple took great pains ensure programs would conform single shared look feel cua similar aim faced difficult task trying impose retroactively existing thriving chaotic industry much ambitious goal unifying ui personal computers minicomputers mainframes supporting character gui modes batch interactive designs comparison apple hig supported interactive gui standalone personal computer cua also attempted measurable standard apple hig large sections formatted checklists measure compliance cua contains standards operation elements dialog boxes menus keyboard shortcuts become influential implemented today many programmers never read cua standards seen operation windows dos-based applications like ms-dos 5 full-screen text editor edit.com cua hallmarks include cua covers dos applications also basis windows consistent user interface standard cui well os/2 applications — text-mode presentation manager gui — ibm mainframes conform systems application architecture cua attempt rationalise dos applications — part larger scheme bring together rationalise harmonise overall functions software hardware across ibm entire computing range microcomputers mainframes perhaps partly completely successful third edition cua took radical departure first two introducing object-oriented workplace changed emphasis user interactions data documents pictures user worked emphasis applications removed intention making computer easier use matching users expectations would work documents using programs rather operating programs work documents see also object-oriented user interface cua strongly influenced early microsoft windows operating system period joint ibm microsoft cooperation os/2 presentation manager later releases ibm cua documents used microsoft products cua became less significant windows environment instance start menu introduced standard keystrokes basic gui widgets specified cua remain available windows cua never significant impact design unix terminal character-mode applications preceded cua decade however major unix gui environments/toolkits whether based x window system featured varying levels cua compatibility motif/cde explicitly featuring design goal current major environments gnome kde also feature extensive cua compatibility subset cua implemented microsoft windows osf/motif generally considered de facto standard followed new unix gui environment
[ 3970, 6147, 10280, 4137, 11562, 6797, 7983, 5492, 3323 ]
None
10,290
4
Department_of_Defense_Cyber_Crime_Center:department defense cyber crime center department defense cyber crime center dc3 designated federal cyber center national security presidential directive 54/homeland security presidential directive 23 department defense dod center excellence digital multimedia d/mm forensics dod directive 5505.13e serves operational focal point defense industrial base dib cybersecurity information assurance cs/ia program dc3 operates air force office special investigations afosi osi deliver superior d/mm forensic services cyber technical training vulnerability sharing technical solutions development cyber analysis following dod mission areas cybersecurity cs critical infrastructure protection cip law enforcement counterintelligence le/ci document media exploitation domex counterterrorism ct dc3 cyber forensics laboratory dc3/cfl performs d/mm forensic examinations device repair data extraction expert testimony dod lab robust intrusion malware analysis capability supports dc3 lines business activities lab operations accredited iso 17025 american society crime laboratory directors/laboratory accreditation board ascld/lab guides reliable repeatable valid exam results subjected quality control peer review dc3 cyber training academy formerly dcita defense cyber investigations training academy provides in-residence online training dod elements protect dod information systems unauthorized use criminal fraudulent foreign intelligence activities academy curriculum offers courses organized specialty areas since founding 1998 academy recorded 35,000 student enrollments courses dc3 technical solutions development dc3/tsd directorate tailors software system solutions engineered specific requirements digital forensic examiners cyber intrusion analysts tsd validates commercial off-the-shelf cots government off-the-shelf gots in-house developed software/hardware used forensic process addition tsd functions dod repository cyber counterintelligence ci tools operational hub dib cs/ia program dib collaborative information sharing environment dc3/dcise assists dib companies safeguard dod content intellectual property residing transiting unclassified networks dcise develops shares actionable threat products performs cyber analysis diagnostics remediation consults dib partners dc3 analytical group dc3/ag supports le/ci agencies including air force office special investigations afosi naval criminal investigative services ncis key mission partners federal bureau investigation fbi member agency national cyber investigative joint task force ncijtf ag leads collaborative analytical technical exchange subject matter experts le/ci computer network defense cnd intelligence community ic information assurance ia agencies build threat picture enabling proactive le/ci cyber operations focuses nation-state threat actors 2006 2013 dc3 held free online international competition consisting individual progressive-level exercises challenges tests included stenography data carving data recovery detection malicious software first year 140 teams u.s. participated challenge final year challenge grown include 1,254 teams 53 countries dc3 hosted dod cyber crime conference 2003 2012 military criminal investigative organizations federal law enforcement
[ 2437, 7449, 7968, 5284, 7979, 11182, 10545, 4789, 8635, 830, 2494, 6475, 4049, 4435, 11221, 3544, 5473, 4834, 5475, 2148, 7525, 1639, 9319, 2558 ]
Validation
10,291
4
NetScreen_Technologies:netscreen technologies netscreen technologies american technology company acquired juniper networks us 4 billion stock stock 2004 netscreen technologies developed asic-based internet security systems appliances delivered high performance firewall vpn traffic shaping functionality internet data centers e-business sites broadband service providers application service providers netscreen first firewall manufacturer develop gigabit-speed firewall netscreen-1000 netscreen technologies founded yan ke ken xie feng deng ken xie chief technology officer co-founder also ceo robert thomas joined 1998 robert thomas netscreen president chief executive officer came netscreen 1998 sun microsystems general manager intercontinental operations sun software business includes security networking internet tools ken xie left netscreen 2000 found fortinet competing asic-based firewall company netscreen acquired core ips technology purchase onesecure inc. us 45 million stock 2002 onesecure created rakesh loonkar subsequently co-founder trusteer israeli engineer nir zuk one check point software ’ first employees 2003 netscreen hired anson chen vice president research development anson chen 12-year veteran cisco systems inc. former vice president general manager network management services technology group led engineering research development efforts netscreen entire product line including firewall ipsec virtual private network vpn intrusion detection prevention technologies chen also functional management responsibility netscreen secure access products yan ke feng deng stayed juniper acquisition left company 2005 start northern light venture capital china concept venture capital firm focused early growth stage opportunities tmt consumer clean technologies life science industries nir zuk stayed juniper acquisition left 2005 start palo alto networks analysis firmware code 2015 showed backdoor key could exist using dual_ec_drbg would enable whoever held key passively decrypt traffic encrypted screenos december 2015 juniper systems announced discovered unauthorized code screenos software underlies netscreen devices present 2012 onwards two vulnerabilities one simple root password backdoor one changing point dual_ec_drbg attackers presumably key use preexisting intentional unintentional kleptographic backdoor screenos passively decrypt traffic
[ 10210, 9927, 6985, 939, 10574, 6481, 5172, 11577, 8668, 2558 ]
None
10,292
1
DBM_(computing):dbm computing computing dbm library file format providing fast single-keyed access data original dbm library file format simple database engine originally written ken thompson released 1979 name three letter acronym database manager also refer family database engines apis features derived original dbm dbm library stores arbitrary data use single key primary key fixed-size buckets uses hashing techniques enable fast retrieval data key hashing scheme used form extendible hashing hashing scheme expands new buckets added database meaning nearly empty database starts one bucket split becomes full two resulting child buckets split become full database grows keys added dbm library derivatives pre-relational databases manage associative arrays implemented on-disk hash tables practice offer practical solution high-speed storage accessed key require overhead connecting preparing queries balanced fact generally opened writing single process time agent daemon handle requests multiple processes introduces ipc overhead original dbm library replaced many successor implementations notable examples include 2001 ndbm implementation dbm standard solaris irix whereas berkeley db implementations standard free operating systems
[ 5120, 3427, 10628, 8582, 9286, 8393, 10921, 11017, 10732, 7728, 2804, 2966, 4598, 5560, 1594, 2045, 9151 ]
Validation
10,293
2
Blob_emoji:blob emoji google blob emoji feature android mobile operating system 2013 2017 google introduced blobs part android kitkat mobile operating system 2013 next year google expanded blob style include emojis normally depict humans example instead flamenco dancer apple emoji style derivates google blob style showed less glamorous blob rose teeth 2016 google redesigned blobs gumdrop-shape unicode group establishes emoji standards introduced skin tone gender options emojis google emojis progressively appeared humans less yellow amorphous blobs google retired blobs 2017 release android oreo favor circular emojis similar style platforms consistent cross-platform emoji interpretation among redesign primary aims redesign development year mimicked apple effort include detail emoji glyph offer yellow skin tone default since 2017 effort maintain blob emojis google retired called blobmoji available github blob emoji divisive feature 2013 2017 proponents praised novel interpretation emoji ideograms detractors criticized miscommunication results emoji interpreted differently across platforms google released sticker packs featuring blob emoji gboard android messages 2018
[ 1427, 5100, 2259 ]
Test
10,294
7
SciDB:scidb scidb column-oriented database management system dbms designed multidimensional data management analytics common scientific geospatial financial industrial applications developed paradigm4 co-created turing award winner michael stonebraker stonebraker claims arrays 100 times faster scidb relational dbms class problems swapping rows columns mathematical arrays put fewer restrictions data work number dimensions unlike conventionally widely used relational database management system model relation supports one dimension records according 2011 conference presentation scidb supports marilyn matz became chief executive company
[ 7868, 10326, 7767 ]
Validation
10,295
4
Hamza_Bendelladj:hamza bendelladj hamza bendelladj arabic حمزة بن دلاج algerian hacker goes code name bx1 nicknamed smiling hacker born 1988 tizi ouzou algeria top 10 list wanted hackers interpol fbi allegedly embezzling tens millions dollars two hundred american european financial institutions via computer virus rimig33k infected 50 million computers worldwide mostly united states developed russian accomplice aleksandr andreevich panin aka gribodemon steal banking information stored infected computers hacked official website israeli government using malicious software called spyeye bendelladj pseudonyms bx1 daniel hb broke computers banks private individuals acquire passwords identification codes took control account emptied three-year hunt bendelladj arrested january 8 2013 thai police making stopover bangkok transit malaysia egypt resist arrest said goodbye family arrested wife daughter continued journey egypt without earned nickname smiling hacker due smile face media presentation photos taken arrest even handcuffed according thai police bendelladj top 10 wanted fbi asked money claimed donated millions dollars palestinian charities trial documents mention extradited may 2013 united states tried atlanta pleaded guilty june 25 2015 faced sentence 30 years prison fine fourteen million dollars accomplice aleksandr andreevich panin arrested july 1 2013 atlanta hartsfield-jackson international airport pleaded guilty january 2014 atlanta federal court 2015 tunisian website posted rumor bendelladj sentenced death rumor spread social networks algeria several facebook support groups created reaction support petition launched demanding algerian ministry foreign affairs president barack obama intervene release us ambassador algeria joan a. polaschik wrote twitter account computer crimes capital crimes punishable death penalty bendelladj prison united states since may 2013 us court sentenced april 20 2016 15 years prison 3 years probation russian accomplice panin 27 aka gribodemon sentenced 9 years 6 months prison report united states department justice estimated spyeye virus stolen approximately billion dollars 2010 2012 affected banks repaired damage caused malware bendelladj lawyer announced intended appeal court decision
[ 10297, 7515, 4956 ]
Test
10,296
9
Action_Code_Script:action code script action code script acs scripting language used video games modern doom source ports zdoom syntactically similar c less flexible name implies core logic script functionality comes form scripts traditionally identified numerical value later revisions acs compiler added support named scripts utilize string lieu numerical identifier simple functions similar traditional code acs compiled using acc homage c gcc utility use doom hexen etc ... scripts executed variety methods attached in-game actors execution level triggers around map invocation scripts functions entire scripting language built hack top doom id tech engine formal support object-oriented programming principles using classic hello world example basic example text hello world printed upon entering level syntax follows
[ 9034, 9780, 2045 ]
None
10,297
4
Zeus_(malware):zeus malware zeus zeus zbot trojan horse malware package runs versions microsoft windows used carry many malicious criminal tasks often used steal banking information man-in-the-browser keystroke logging form grabbing also used install cryptolocker ransomware zeus spread mainly drive-by downloads phishing schemes first identified july 2007 used steal information united states department transportation became widespread march 2009 june 2009 security company prevx discovered zeus compromised 74,000 ftp accounts websites companies bank america nasa monster.com abc oracle play.com cisco amazon businessweek similarly koobface zeus also used trick victims technical support scams giving scam artists money pop-up messages claim user virus reality might viruses scammers may use programs command prompt event viewer make user believe computer infected zeus difficult detect even up-to-date antivirus security software hides using stealth techniques considered primary reason zeus malware become largest botnet internet damballa estimated malware infected 3.6 million pcs u.s. 2009 security experts advising businesses continue offer training users teach click hostile suspicious links emails web sites keep antivirus protection date antivirus software claim reliably prevent infection example symantec browser protection says prevent infection attempts october 2010 us fbi announced hackers eastern europe managed infect computers around world using zeus virus distributed e-mail targeted individuals businesses municipalities opened e-mail trojan software installed victimized computer secretly capturing passwords account numbers data used log online banking accounts hackers used information take victims ’ bank accounts make unauthorized transfers thousands dollars time often routing funds accounts controlled network money mules paid commission many u.s. money mules recruited overseas created bank accounts using fake documents false names money accounts mules would either wire back bosses eastern europe withdraw cash smuggle country 100 people arrested charges conspiracy commit bank fraud money laundering 90 us others uk ukraine members ring stolen 70 million 2013 hamza bendelladj known bx1 online arrested thailand deported atlanta georgia usa early reports said mastermind behind zeus accused operating spyeye bot functionally similar zeus botnets suspected also operating zeus botnets charged several counts wire fraud computer fraud abuse court papers allege 2009 2011 bendelladj others developed marketed sold various versions spyeye virus component parts internet allowed cybercriminals customize purchases include tailor-made methods obtaining victims ’ personal financial information also alleged bendelladj advertised spyeye internet forums devoted cyber- crimes operated command control servers charges georgia relate spyeye spyeye botnet control server based atlanta late 2010 number internet security vendors including mcafee internet identity claimed creator zeus said retiring given source code rights sell zeus biggest competitor creator spyeye trojan however experts warned retirement ruse expect developer return new tricks
[ 3072, 10756, 10245, 5131, 9233, 535, 4648, 9256, 46, 10295, 10297, 3643, 7739, 9791, 1088, 2114, 4165, 81, 8789, 2147, 10340, 107, 3704, 10875, 5245, 2175, 6786, 3724, 6797, 9356, 10392, 1690, 5281, 2213, 6834, 184, 704, 7364, 10952, 1045...
Validation
10,298
4
Lorcon:lorcon lorcon acronym loss radio connectivity open source network tool library injecting 802.11 wlan frames capable injecting via multiple driver frameworks without need change application code lorcon built patching third-party codice_1-driver cards based qualcomm atheros wireless chipset project maintained joshua wright michael kershaw dragorn
[ 11221, 5492, 1429 ]
Test
10,299
4
Orange_box:orange box orange box piece hardware software generates caller id frequency-shift keying fsk signals spoof caller id information target caller id terminal
[ 2920, 11170, 8950 ]
None
10,300
4
Anti-pharming:anti-pharming anti-pharming techniques technology used combat pharming traditional methods combating pharming include server-side software dns protection web browser add-ins toolbars server-side software typically used enterprises protect customers employees use internal private web-based systems pharmed phished browser add-ins allow individual users protect phishing dns protection mechanisms help ensure specific dns server hacked thereby become facilitator pharming attacks spam filters typically provide users protection pharming currently efficient way prevent pharming end users make sure using secure web connections https access privacy sensitive sites banking taxing accept valid public key certificates issued trusted sources certificate unknown organisation expired certificate accepted time crucial business so-called active cookies provide server-side detection tool legislation also plays essential role anti-pharming march 2005 u.s senator patrick leahy d-vt introduced anti-phishing act 2005 bill proposes five-year prison sentence and/or fine individuals execute phishing attacks use information garnered online fraud phishing pharming commit crimes identity theft home users consumer-grade routers wireless access points perhaps single effective defense change password router something default replacing password susceptible dictionary attack
[ 10915, 7557, 2887, 9744, 4956 ]
None
10,301
3
Integration_Objects:integration objects integration objects software development firm created 2002 company systems integrator solutions provider knowledge management automation plant process management decision support applications develops opc software products knowledge management platforms manufacturers primarily oil gas refining petrochemicals chemical food beverage steel pharmaceutical industries also provides consulting services integration objects member opc foundation international society automation mimosa also collaborated partnered companies invensys osisoft gensym abb large projects clients include exxonmobil saudi aramco solvay chemicals opc technology follows set open standards specifications created managed opc foundation ensure interoperability devices systems industrial automation within enterprise systems origins opc based microsoft ole com dcom technology today opc set standards allow field systems devices automation control applications business applications communicate acquired real-time historical data records enterprise systems production devices multiple vendors standards evolving created rewritten account emerging technologies trends manufacturing companies invest large amounts money industrial automation infrastructures many yet realize full value investment many remain islands automation information silos disconnected systems including business systems enormous amounts data may available companies often lack proper infrastructure would allow adequately share data use improve process efficiency profitability integration process control plant-level enterprise systems longer option manufacturing energy companies want remain competitive convergence world automation process controls greatly helps effort providing economically technically competitive solutions however sharing process information within networks must done way aligns overall security policies enterprise system integrators must find customized solutions fit specific company needs goals many enterprises across various industries face issue important resources data information knowledge embedded computer systems documentation minds individuals across organization accessing extremely difficult time-consuming however using intelligent computer platforms capture integrate knowledge analyze organize store well users monitor manage operations performances effectively make safe smart decisions rapidly improve results knowledge management allows organization benefit collective knowledge written resources employees experiences know-how applications knowledge management systems found many fields example case abnormal plant conditions knowledge management platforms allow operator identify root cause problem correct action taken automatically reviewing stored analyzed data found system knowledge management strategic asset necessary organization remain competitive
[ 2948, 8581 ]
Validation
10,302
4
RecoverPoint:recoverpoint recoverpoint continuous data protection product offered dell emc supports asynchronous synchronous data replication block-based storage recoverpoint originally created company called kashya bought emc 2006 kashya founded february 2001 originally located ramat gan israel venture funding included battery ventures jerusalem global ventures 2003 additional operations san jose california announced along 12 million funding first product kashya acquired emc corporation may 9 2006 153 million emc already announced product named recoverpoint october 2005 adapted product called recovery one mendocino software kashya product named kdx 5000 emc recoverpoint product based kashya technology released 2007 version 3.0 released 2008 recoverpoint continuous data protection cdp tracks changes data block level journals changes every write tracked stored different snapshot alternatively groups writes aggregated according configuration order reduce storage space network traffic journal allows rolling data previous point-in-time order view drive contents certain data corruption cdp journal write individually hence enabling any-point-in-time snapshots configured combine consecutive writes order reduce journal space improve bandwidth cdp works storage area network recoverpoint appliances need configured replica journal logical unit numbers luns recoverpoint continuous remote replication crr enables replica remote site setup recoverpoint appliances clusters required local remote sites 2 clusters communicate either fibre channel fc internet protocol recoverpoint applies data compression data de-duplication order reduce wide area network traffic recoverpoint 3.4 one remote site crr combined cdp order provide concurrent local remote clr replication consistency group cg term used grouping several luns together order ensure write-order consistency several volumes used example database stores data journal different logical drives logical drives must kept in-sync replica data-consistency needs preserved examples multi-volume file systems zfs windows dynamic disks similar continuous data protection products unlike backup products recoverpoint needs obtain copy every write order track data changes emc advertises recoverpoint heterogenous due support multi-vendor server network storage arrays host-based write splitting done using device driver installed server accessing storage volumes usage host-based splitter allows replication selected non-emc storage available fabric-based splitters brocade communications systems san switches cisco systems santap requires investment additional switch blades configuration allows splitting operating systems regardless version agnostic storage array vendor storage array splitters supported subset emc storage products method allows write splitting operating systems require special san switching hardware recoverpoint/se slimmed-down version supports type splitter site requires installation cluster composed 2-8 recoverpoint appliances multiple appliances work together high availability cluster appliance connected via fc san must access server scsi initiator storage scsi target appliance must also connected ip network management replication takes place either fc standard internet protocol one splitters would split traffic storage appliances besides integration emc products appsync vipr replication manager control center unisphere clariion vnx symmetrix vplex storage arrays recoverpoint integrates following products integration vmware vsphere vmware site recovery manager microsoft hyper-v allows protection specified per virtual machine instead per volumes available hypervisor integration microsoft shadow copy exchange sql server oracle database server allows recoverpoint temporarily stop writes host order take consistent application-specific snapshots application programming interfaces command-line interfaces allow customers integrate custom internal software
[ 5472, 11233, 9218, 2051, 6852, 10340, 3366, 1990, 10951, 6153, 2154, 6834, 6003, 11030, 9655, 1049, 9343 ]
None
10,303
3
Huawei:huawei huawei technologies co. ltd. chinese multinational technology company provides telecommunications equipment sells consumer electronics including smartphones headquartered shenzhen guangdong province company founded 1987 ren zhengfei initially focused manufacturing phone switches huawei expanded business include building telecommunications networks providing operational consulting services equipment enterprises inside outside china manufacturing communications devices consumer market huawei 188,000 employees around 76,000 engaged research development r 21 r institutes around world april 2019 opened dedicated ox horn campus dongguan company invested us 13.8 billion r huawei deployed products services 170 countries served 45 50 largest telecom operators networks numbering 1,500 reach one third world population huawei overtook ericsson 2012 largest telecommunications-equipment manufacturer world overtook apple 2018 second-largest manufacturer smartphones world behind samsung electronics ranks 72nd fortune global 500 list december 2018 huawei reported annual revenue risen us 108.5 billion 2018 21 increase 2017 although successful internationally huawei faced difficulties markets due cybersecurity allegations—primarily united states government—that huawei infrastructure equipment may enable surveillance chinese government especially development 5g wireless networks china aggressively promoted calls u.s. prevent use products huawei fellow chinese telecom zte u.s. allies huawei argued products posed greater cybersecurity risk vendor evidence u.s. espionage claims nonetheless huawei pulled u.s. consumer market 2018 concerns affected ability market consumer products u.s. measures intensified may 2019 midst ongoing trade war china united states huawei restricted commerce u.s. companies due alleged previous willful violations u.s. sanctions iran 29 june 2019 u.s. president donald trump reached agreement resume trade talks china announced would ease aforementioned sanctions huawei name huawei literally translates china hua shortened form huaxia poetic name china wei means make chinese pinyin huáwéi pronounced mandarin chinese cantonese name transliterated jyutping waa-wai pronounced however pronunciation huawei non-chinese varies countries example hoe-ah-wei netherlands company considered changing name english concerned non-chinese may find name hard pronounce decided keep name launched name recognition campaign instead encourage pronunciation closer wah-way using words wow way 1980s chinese government tried modernize country underdeveloped telecommunications infrastructure core component telecommunications network telephone exchange switches late 1980s several chinese research groups endeavored acquire develop technology usually joint ventures foreign companies ren zhengfei former deputy director people liberation army engineering corps founded huawei 1987 shenzhen company reports rmb 21,000 registered capital time founding ren sought reverse engineer foreign technologies local researchers time china telecommunications technology imported abroad ren hoped build domestic chinese telecommunication company could compete ultimately replace foreign competitors first several years company business model consisted mainly reselling private branch exchange pbx switches imported hong kong meanwhile reverse-engineering imported switches investing heavily research development manufacture technologies 1990 company approximately 600 r staff began independent commercialization pbx switches targeting hotels small enterprises company first major breakthrough came 1993 launched c c08 program controlled telephone switch far powerful switch available china time initially deploying small cities rural areas placing emphasis service customizability company gained market share made way mainstream market huawei also key contract build first national telecommunications network people liberation army deal one employee described small terms overall business large terms relationships 1994 founder ren zhengfei meeting party general secretary jiang zemin telling switching equipment technology related national security nation switching equipment like one lacked military jiang reportedly agreed assessment 1990s canadian telecom giant nortel outsourced production entire product line huawei subsequently outsourced much product engineering huawei well another major turning point company came 1996 government beijing adopted explicit policy supporting domestic telecommunications manufacturers restricting access foreign competitors huawei promoted government military national champion established new research development offices 1997 huawei contract provide fixed-line network products hong kong company hutchison whampoa later year huawei launched wireless gsm-based products eventually expanded offer cdma umts 1999 company opened research development r center bangalore india develop wide range telecom software may 2003 huawei partnered 3com joint venture known h3c focused enterprise networking equipment marked 3com re-entrance high-end core routers switch market abandoned 2000 focus businesses 3com bought huawei share venture 2006 us 882 million 2005 huawei foreign contract orders exceeded domestic sales first time huawei signed global framework agreement vodafone agreement marked first time telecommunications equipment supplier china received approved supplier status vodafone global supply chain huawei also signed contract british telecom bt deployment multi-service access network msan transmission equipment bt 21st century network 21cn 2007 huawei began joint venture u.s. security software vendor symantec corporation known huawei symantec aimed provide end-to-end solutions network data storage security huawei bought symantec share venture 2012 new york times noting symantec fears partnership would prevent obtaining united states government classified information cyberthreats may 2008 australian carrier optus announced would establish technology research facility huawei sydney october 2008 huawei reached agreement contribute new gsm-based hspa+ network deployed jointly canadian carriers bell mobility telus mobility joined nokia siemens networks huawei delivered one world first lte/epc commercial networks teliasonera oslo norway 2009 july 2010 huawei included global fortune 500 2010 list published u.s. magazine fortune first time strength annual sales us 21.8 billion net profit us 2.67 billion october 2012 announced huawei would move uk headquarters green park reading berkshire september 2017 huawei created narrowband iot city-aware network using one network one platform n applications construction model utilising iot cloud computing big data next-generation information communications technology also aims one world five largest cloud players near future april 2019 huawei established huawei malaysia global training centre mgtc cyberjaya malaysia huawei ’ first training centre outside china end 2018 huawei sold 200 million smartphones reported strong consumer demand premium range smart phones helped company reach consumer sales excess 52 billion 2018 huawei announced worldwide revenues 105.1 billion 2018 net profit 8.7 billion huawei q1 2019 revenues 39 year-over-year us 26.76 billion huawei centre espionage allegations chinese 5g network equipment 2018 united states passed defense funding bill contained passage barring federal government business huawei zte several chinese vendors surveillance products due security concerns 1 december 2018 huawei vice-chairwoman cfo meng wanzhou daughter company founder ren zhengfei arrested canada request u.s. authorities faced extradition united states charges violating sanctions iran 22 august 2018 arrest warrant issued u.s. district court eastern district new york meng charged conspiracy defraud multiple international institutions according prosecutor warrant based allegations conspiracy defraud banks clearing money claimed huawei actually skycom entity claimed entirely controlled huawei said dealing iran contrary sanctions none allegations proven court 11 december 2018 meng released bail 28 january 2019 u.s. federal prosecutors formally indicted meng huawei thirteen counts bank wire fraud order mask sale u.s. technology iran illegal sanctions obstruction justice misappropriating trade secrets department also filed formal extradition request meng canadian authorities day huawei responded charges said denies subsidiary affiliate committed asserted violations well asserted meng similarly innocent china ministry industry information technology believed charges brought united states unfair august 2018 national defense authorization act fiscal year 2019 ndaa 2019 signed law containing provision banned huawei zte equipment used u.s. federal government citing security concerns huawei filed lawsuit act march 2019 alleging unconstitutional specifically targeted huawei without granting chance provide rebuttal due process 15 may 2019 department commerce added huawei 70 foreign subsidiaries affiliates entity list export administration regulations citing company indicted knowingly willfully causing export re-export sale supply directly indirectly goods technology services banking financial services united states iran government iran without obtaining license department treasury office foreign assets control ofac restricts u.s. companies business huawei without government license various u.s.-based companies immediately froze business huawei comply regulation including google—which removes ability certify future devices updates android operating system licensed google mobile services gms google play store well broadcom intel qualcomm microsoft xilinx western digital german chipmaker infineon technologies also voluntarily suspended business huawei pending assessments reported huawei limited stockpile u.s.-sourced parts obtained prior sanctions 17 may 2019 huawei voluntarily suspended membership jedec temporary measure restrictions imposed u.s. government removed speaking chinese media huawei founder ren zhengfei accused u.s. politicians underestimating company strength explained terms 5g technologies others wo n't able catch huawei two three years sacrificed families ideal stand top world reach ideal sooner later conflict us kevin wolf international trade lawyer former assistant secretary commerce export administration obama administration argued huawei could even use open source android open source project aosp code could fall u.s. trade regulations technology u.s. origin google majority developer china normal android phones including huawei include google play store gms google business region phones typically bundled aosp-based distribution built around oem software suite including either first-party app store run oem huawei appgallery third-party service google issued statement assuring user access google play existing huawei devices would disrupted huawei made similar pledge continued support existing devices including security patches make statements regarding availability future android versions upcoming android q 19 may 2019 department commerce granted huawei temporary three-month license continue business u.s. companies purposes maintaining existing smartphone telecom products without interruption whilst long-term solutions determined 22 may 2019 arm holdings also suspended business huawei including active contracts support entitlements pending engagements although japanese-owned company based uk arm cited intellectual property contained technologies u.s. origin believed covered department commerce order prevents huawei manufacturing chips use arm architecture also reported several asian wireless carriers including japan softbank kddi taiwan chunghwa telecom taiwan mobile suspended sale upcoming huawei devices p30 lite citing uncertainties effects u.s. sanctions availability android platform ntt docomo similarly suspended pre-orders new huawei phones without citing reasoning 23 may 2019 reported sd association removed huawei list members—implicating revocation membership association day toshiba briefly suspended shipments huawei temporary measure determining whether selling u.s. made components technologies huawei panasonic also stated determined business relationship compliance u.s. law would suspend next day wi-fi alliance also temporarily restricted huawei membership 24 may 2019 huawei told reuters fedex attempted divert two packages sent japan addressed huawei china united states tried divert two packages sent vietnam huawei offices elsewhere asia without authorization first fedex china claimed media reports true may 28 however apologized chinese social media account fact small number huawei shipments misrouted claimed external parties require fedex ship shipments 29 may 2019 reported huawei listed member jedec sd association wi-fi alliance addition science organization ieee initially banned huawei employees peer-reviewing papers handling papers editors may 30th 2019 citing legal concerns ban also revoked june 3rd 2019 29 june 2019 g20 summit trump chinese president general secretary xi jinping agreed resume trade negotiations trump made statements implicating plans ease restrictions u.s. companies business huawei explaining sold tremendous amount products company exactly happy could n't sell referring equipment great national security problem bbc news considered move significant concession sanctions noted huawei working in-house operating system codenamed hongmeng os interview die welt executive richard yu stated in-house os could used plan b prevented using android windows result u.s. action would prefer work ecosystems google microsoft efforts develop in-house os huawei date back far 2012 huawei filed trademarks names ark ark os harmony europe speculated connected os june 2019 huawei communications vp andrew williamson told reuters company testing hongmeng china could ready months however july 2019 chairman liang hua senior vice president catherine chen stated hongmeng os actually intended mobile operating system smartphones actually embedded operating system designed internet things iot hardware huawei classifies collective entity prior 2019 refer private company richard mcgregor author said definitional distinction essential company receipt state support crucial points development mcgregor argued huawei status genuine collective doubtful huawei position shifted 2019 dr. song liuping huawei chief legal officer commented us government ban said politicians us using strength entire nation come private company emphasis added ren zhengfei founder ceo huawei power veto decisions made board directors huawei disclosed list board directors first time 2010 liang hua current chair board members board liang hua guo ping xu zhijun hu houkun meng wanzhou cfo deputy chairwoman currently bail vancouver arrested december 1 2018 extradition request us authorities suspicion iran sanctions evasion ding yun yu chengdong wang tao xu wenwei chen lifang peng zhongyang tingbo li yingtao ren zhengfei yao fuhai tao jingwen yan lida guo ping chairman huawei device huawei mobile phone division huawei ’ chief ethics compliance officer zhou daiqi also huawei ’ communist party committee secretary chief legal officer song liuping huawei maintains employee-owned company ren zhengfei retains approximately 1 percent shares huawei holding company huawei investment holding remainder shares held trade union committee trade union per se internal governance procedures committee members leaders selected remain unknown claimed representative huawei employee shareholders company trade union committee registered pay dues shenzhen federation all-china federation trade unions also due limitation chinese law preventing limited liability companies 50 shareholders half huawei staff participate scheme foreign employees eligible hold company calls virtual restricted shares shares nontradable allocated reward performance employees leave huawei shares revert company compensates holding although employee shareholders receive dividends shares entitle direct influence management decisions enables vote members 115-person representatives ’ commission preselected list candidates representatives ’ commission selects huawei holding board directors board supervisors scholars found stages historical morphing employees part huawei “ shares ” instead “ virtual stock contract right property right gives holder voting power either huawei tech huawei holding transferred cancelled employee leaves firm subject redemption payment huawei holding tuc low fixed price ” debate whether trade union committee structure enabling government people republic china influence huawei chinese company trade unions report senior trade union organizations turn report all-china federation trade unions controlled communist party china therefore academics considered huawei owned controlled chinese government also argued huawei much state owned enterprise party owned enterprise approximately 80 world top 50 telecoms companies worked huawei prominent partners include since 2016 german camera company leica established partnership huawei leica cameras co-engineered huawei smartphones including p mate series first smartphone co-engineered leica camera huawei p9 huawei organized around three core business segments huawei announced enterprise business january 2011 provide network infrastructure fixed wireless communication data center cloud computing solutions global telecommunications customers huawei core network solutions offer mobile fixed softswitches plus next-generation home location register internet protocol multimedia subsystems ims huawei sells xdsl passive optical network pon next-generation pon ng pon single platform company also offers mobile infrastructure broadband access service provider routers switches sprs huawei software products include service delivery platforms sdps bsss rich communication suite digital home mobile office solutions huawei global services provides telecommunications operators equipment build operate networks well consulting engineering services improve operational efficiencies include network integration services mobile fixed networks assurance services network safety learning services competency consulting huawei devices division provides white-label products content-service providers including usb modems wireless modems wireless routers mobile wi-fi embedded modules fixed wireless terminals wireless gateways set-top boxes mobile handsets video products huawei also produces sells variety devices name ideos smartphones tablet pcs huawei smartwatch july 2003 huawei established handset department 2004 huawei shipped first phone c300 u626 huawei first 3g phone june 2005 2006 huawei launched first vodafone-branded 3g handset v710 u8220 huawei first android smartphone unveiled mwc 2009 ces 2012 huawei introduced ascend range starting ascend p1 s. mwc 2012 huawei launched ascend d1 september 2012 huawei launched first 4g ready phone ascend p1 lte ces 2013 huawei launched ascend d2 ascend mate mwc 2013 ascend p2 launched world first lte cat4 smartphone june 2013 huawei launched ascend p6 december 2013 huawei introduced honor subsidiary independent brand china ces 2014 huawei launched ascend mate2 4g 2014 mwc 2014 huawei launched mediapad x1 tablet ascend g6 4g smartphone launched 2014 included ascend p7 may 2014 ascend mate7 ascend g7 ascend p7 sapphire edition china first 4g smartphone sapphire screen january 2015 huawei discontinued ascend brand flagship phones launched new p series huawei p8 huawei also partnered google build nexus 6p 2015 current models p mate lines p30 p30 pro mate 20 mate 20 pro mate 20 x released 2018 2019 emotion ui emui rom/os developed huawei technologies co. ltd. based google android open source project aosp emui pre-installed huawei smartphone devices subsidiaries honor series huawei technologies co. ltd. world largest telecom equipment maker china largest telephone-network equipment maker 3,442 patents huawei became world 1 applicant international patents 2014 21 r institutes countries including china united states canada united kingdom pakistan finland france belgium germany colombia sweden ireland india russia israel turkey huawei considering opening new research development r center russia 2019/2020 would third country moscow st. petersburg r centers huawei also announced plans november 2018 open r center french city grenoble would mainly focused smartphone sensors parallel computing software development new r team grenoble expected grow 30 researchers 2020 said company company said new addition brought five number r teams country two located sophia antipolis paris researching image processing design two existing teams based huawei facilities boulogne-billancourt working algorithms mobile 5g standards technology giant also intended open two new research centers zürich lausanne switzerland huawei time employed around 350 people switzerland huawei faced criticism various aspects operations prominent controversies involved u.s. allegations products containing backdoors chinese government espionage—consistent domestic laws requiring chinese citizens companies cooperate state intelligence warranted huawei executives consistently denied allegations stated company never received requests chinese government introduce backdoors equipment would refuse chinese law compel huawei also accused various instances intellectual property theft parties nortel cisco systems t-mobile us huawei employee photographed robotic arm used stress-test smartphones taken fingertip robot
[ 4611, 9732, 6, 2057, 8719, 11282, 3605, 9237, 4124, 3117, 8237, 1083, 9279, 5185, 9793, 7751, 8794, 97, 1121, 4194, 1638, 107, 1650, 9851, 11391, 9863, 5262, 1169, 10393, 7835, 4259, 8355, 172, 5293, 10417, 6834, 2235, 10433, 196, 710, ...
Train
10,304
2
Wish_(Unix_shell):wish unix shell wish windowing shell tcl interpreter extended tk commands available unix-like operating systems x window system macos microsoft windows android provides developers facility create gui widgets using tk toolkit tcl programming language wish open-source currently part tcl/tk programming suite codice_1 run without parameters codice_2 prompt displayed interpreter awaits commands entered interactively user empty window opened widgets created user commands displayed mode suitable experimenting often codice_1 run name file containing tcl/tk script parameter also possible run directly tcl/tk scripts unix using shebang construction windows associating codice_4 extension wish program
[ 8675, 2181, 5612, 6797, 7983, 11632, 7346, 11442, 5492, 5397, 692, 4859 ]
Validation
10,305
4
William_B._Black_Jr.:william b black jr. william bolding black jr. born august 25 1936 former deputy director national security agency black joined national security agency 1959 operational linguist/analyst three years army employed nsa black completed wide variety assignments including special assistant director information warfare chief group operations analysis chief nsa/css representative europe office nceur associate deputy director operations/ military support served chief deputy chief major field installation worked way senior cryptologic executive service primary focus building new organizations creating new ways business black retired nsa 1997 1997 black became assistant vice president director information operations advanced technologies solutions group science applications international corporation saic saic black led information operations research worked information operations technology center establish institute analysis complex systems develop advanced techniques analysis networks critical infrastructures black returned nsa 2000 become deputy director since 2002 overseeing trailblazer project aimed analyzing data computer networks tracking cell phone email communications 2002 main contract trailblazer ultimately worth us 1.2 billion awarded black former employer science applications international corporation april 2005 outgoing nsa director michael hayden told senate hearing trailblazer program several hundred million dollars budget years behind schedule michael hayden promotion deputy director national intelligence black acting director nsa appointment new nsa director lt. gen. keith b. alexander august 2006 black replaced john c. inglis offered take position liaison officer nsa british intelligence counterpart native new mexico black currently resides pasadena maryland wife iris three children 1975 mr. black served various positions nsa headquarters nsa european headquarters pentagon
[ 266, 6668, 9357, 2712, 289, 4898, 11302, 1714, 327, 7759, 7887, 2897, 10832, 4566, 6749, 7137, 3305, 365, 4719 ]
Test
10,306
2
Rufus_(software):rufus software rufus free open-source portable application microsoft windows used format create bootable usb flash drives live usbs developed pete batard akeo consulting rufus originally designed modern open source replacement hp usb disk storage format tool windows primarily used create dos bootable usb flash drives first official release rufus version 1.0.3 earlier versions internal/alpha released december 11 2011 originally ms-dos support version 1.0.4 introduced freedos support version 1.1.0 introduced iso image support 1.2.0 two separate versions provided one ms-dos one freedos uefi boot support introduced version 1.3.2 localization 1.4.0 windows go 2.0 last version compatible windows xp vista 2.18 rufus supports variety bootable .iso files including various linux distributions windows installation .iso files well raw disk image files including compressed ones needed install bootloader syslinux grub onto flash drive render bootable also allows installation ms-dos freedos onto flash drive well creation windows go bootable media supports formatting flash drives fat fat32 ntfs exfat udf refs filesystems rufus also used compute md5 sha-1 sha-256 hashes currently selected image
[ 9377, 4637, 292, 9420, 6797, 6062, 7983, 9166, 2193, 3834, 6012, 2045 ]
None
10,307
4
Certified_Information_Systems_Security_Professional:certified information systems security professional certified information systems security professional cissp independent information security certification granted international information system security certification consortium also known isc ² december 31 2018 131,180 isc ² members holding cissp certification worldwide 171 countries united states holding highest member count 84,557 members cissp designation accredited ansi also formally approved u.s. department defense dod information assurance technical iat managerial iam categories dodd 8570 certification requirement mid-1980s need arose standardized vendor-neutral certification program provided structure demonstrated competence november 1988 special interest group computer security sig-cs member data processing management association dpma brought together several organizations interested goal international information systems security certification consortium isc ² formed mid-1989 non-profit organization 1990 first working committee establish common body knowledge cbk formed first version cbk finalized 1992 cissp credential launched 1994 2003 cissp adopted baseline u.s. national security agency issep program cissp curriculum covers subject matter variety information security topics cissp examination based isc ² terms common body knowledge cbk according isc ² cissp cbk taxonomy – collection topics relevant information security professionals around world cissp cbk establishes common framework information security terms principles allow information security professionals worldwide discuss debate resolve matters pertaining profession common understanding 15 april 2018 cissp curriculum updated follows 2015 early 2018 cissp curriculum divided eight domains similar latest curriculum domain changed name security engineering 2018 revision expanded security architecture engineering 2015 covered ten similar domains number cissp members december 31 2018 holders cissp certifications earn additional certifications areas specialty three possibilities standard exam costs 699 usd 650 eur 2019 cissp credential valid three years holders renew submitting continuing professional education cpe credits also yearly membership fee required maintain certification fee increased nearly 50 starting mid-2019 2005 certification magazine surveyed 35,167 professionals 170 countries compensation found cissps led list certificates ranked salary 2006 certification magazine salary survey also ranked cissp credential highly ranked cissp concentration certifications top best-paid credentials 2008 another study came conclusion professionals cissp major security certifications least 5 years experience tend salaries around us us 26 higher professionals similar experience levels certificates note actual cause-and-effect relationship certificate salaries remains unproven 2017 study cybersecuritydegrees.com surveyed 10,000 current historical cyber security job listings preferred candidates holding cissp certifications cybersecuritydegrees found job openings offered average salary average cyber security salary ansi certifies cissp meets requirements ansi/iso/iec standard 17024 personnel certification accreditation program
[ 10372, 9607, 8462, 5010, 1182, 1312, 8613, 6834, 316, 8381, 7887, 10322, 10196, 1493, 6105, 10717, 10718, 357, 3447, 5373 ]
Test
10,308
4
ClamTk:clamtk clamtk free software graphical interface clamav command line antivirus software program linux desktop users provides on-demand scheduled scanning project started dave mauroni february 2004 remains development clamtk originally written using tk widget toolkit named later re-written perl using gtk toolkit interface evolved considerably time recent versions quite different early releases adding features changing interface presentation dual-licensed gnu general public license version 1 later artistic license clamtk interface allows scanning single files directories configured recursive scans scanning sub-directories whitelists scan potentially unwanted applications puas exclude hidden files large files 20 mb 2017 ghacks reviewer mike turcotte-mccusker noted high rate false positives pua-inclusive scans return history selection allows reviewing results previous scans quarantined files clamtk allows manual automatic updates configured clamav virus definitions application interfaces thunar-sendto-clamtk nemo-sendto-clamtk clamtk-gnome clamtk-kde provide context menu functionality associated file managers thunar nemo gnome files dolphin allowing users directly send files clamtk scanning clamtk also run command-line interface although main reason command line access exists interface various file managers clamtk included repositories many linux distributions including alt linux arch linux centos debian fedora gentoo linux mint mandriva opensuse pclinuxos red hat enterprise linux ubuntu well freebsd users install clamtk repositories linux distribution using application website also provides downloads latest release versions form .rpm .deb files 2014 review clamtk 5.0.7 silviu stahie softpedia recommended application means getting clamav functionality easy-to-use graphical interface wrote basically functions clamtk performed terminal clamav would fine desktop environment like server reason use terminal regular linux distribution 2015 review bill toulas forge noted clamtk seemed take comparable amount time scan clamav indicting n't slowing scanning engine 2017 review linux ubuntu said clamtk provides simple gui allows beginners comfortable use cli upon launching clamtk presented clean gui 4 main sections 2018 listing mangesh dhulap top 10 best free linux antivirus programs – reviewed smart tricks listed clamtk first choice free linux antivirus programs ubuntu pit listing best linux antivirus top 10 reviewed compared clamtk recommended average users described lightweight 2019 review make tech easier included clamtk review best antivirus programs ubuntu reported need good virus scanner ’ fan command line clamtk best choice rewiew derrik diener additive tips 2019 stated ... like features clamav tool dislike dealing command-line ’ get useful features nice easy-to-use interface ... clamtk takes advanced clamav features command-line wraps incredibly simple user interface average linux user use
[ 2049, 7809, 131, 5891, 8582, 1417, 3981, 6797, 10637, 4374, 1052, 156, 6431, 2721, 5924, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 6699, 8615, 7983, 6834, 4403, 9523, 10166, 823, 7103, 704, 9537, 7362, 4421, 202, 1355, 5069, 10574, ...
Test
10,309
4
List_of_cyber_attack_threat_trends:list cyber attack threat trends list cyber attack threat trends presented alphabetical order methods used 1990s 2015
[ 7553, 3843, 10756, 8206, 9102, 7441, 3218, 4883, 2330, 9242, 8478, 9145, 4672, 4163, 2887, 6091, 3789, 4304, 2902, 87, 9688, 11621, 9460, 1781, 2041 ]
Test
10,310
3
Windows_NT_processor_scheduling:windows nt processor scheduling windows nt processor scheduling refers process windows nt determines job task run computer processor time without scheduling processor would give attention jobs based arrived queue usually optimal part scheduling processor gives priority level different processes running machine two processes requesting service time processor performs jobs one higher priority six named priority levels levels associated numbers applications start base priority level eight system dynamically adjusts priority level give applications access processor priority levels 0 15 used dynamic applications priority levels 16- 31 reserved real-time applications multiprocessing environment one logical processor i.e multiple cores hyperthreading one task running time however process thread set run subset available logical processors windows task manager utility offers user interface process level
[ 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 10281, 2101, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8841, 2193, 9874, 10900, 4248, 9377, 3235, 4771, 6820, 1703, 5300, 27...
Validation
10,311
1
European_Sleep_Apnea_Database:european sleep apnea database european sleep apnea database esada also referred spelling european sleep apnoea database european sleep apnoea cohort collaboration european sleep centres part european cooperation science technology cost action b 26 main contractor project sahlgrenska academy gothenburg university institute medicine department internal medicine co-ordinator jan hedner md phd professor sleep medicine book clinical genomics practical applications adult patient care said esada example initiatives afford excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource 2006 european sleep apnea database esada began initiative 27 european sleep study facilities combine information compile one shared resource formed part european cooperation science technology cost action b 26 addition financial help cost initiative received assistance companies philips respironics resmed database storing association resource information located gothenburg sweden group goal twofold serve reference guide researching sleep disorders compile information different caregivers treat patients suffering sleep apnea 5,103 patients tracked march 2007 august 2009 data collected patients included symptoms suffered medication medical history sleep data inputted online format analysis database researchers reported methodology results 2010 american thoracic society observed findings regarding percentages metabolic cardiovascular changes related patients obstructive sleep apnea 2010 research resulted collaboration 22 study centres across 16 countries europe involving 27 researchers primary participants presented american thoracic society included researchers sahlgrenska university hospital gothenburg sweden technion – israel institute technology haifa israel national tb lung diseases research institute warsaw poland cnr institute biomedicine molecular palermo italy instituto auxologico italiano ospedale san luca milan italy st. vincent university hospital dublin ireland analysis published 2010 american journal respiratory critical care medicine 2011 22 sleep disorder centres europe involved collaboration group published research 2011 analyzing percentage patients suffering sleep apnea obesity 2012 database maintained information 12,500 patients europe also contained dna samples 2,600 individuals esada represented 2012 21st annual meeting european sleep research society paris france one four european sleep research networks held session event pierre escourrou fadia jilwan wrote 2012 article european respiratory journal studying data esada involving 8,228 total patients 23 different facilities analyzed whether polysomnography good measure hypopnea sleep apnea researchers department pulmonary diseases turku university hospital turku finland compared variations sleep centres esada database published findings european respiratory journal looked traits 5,103 patients 22 centres reported average age patients database prevalence region performing sleep study cardiorespiratory polygraphy database added centre hamburg germany 2013 managed physician holger hein group annual meeting 2013 held edinburgh united kingdom run renata riha march 2013 approximately 13,000 total patients studied program 200 additional patients added database month analysis published researchers italy sweden september 2013 european respiratory journal analyzed correlation renal function problems obstructive sleep apnea analyzed data 17 countries europe representing 24 sleep centres 8,112 total patients tested whether patients different types demographics existing health problems change probability kidney function problems concurrently suffered obstructive sleep apnea 2014 researchers released data studying 5,294 patients database compared prevalence sleep apnea increased blood sugar results published european respiratory journal studied glycated hemoglobin levels patients compared measured severity sleep apnea researchers analyzed glycated hemoglobin levels among class individuals less severe sleep apnea higher determined amount sleep apnea problems 20 march 2014 database included information total 15,956 patients 2014 article european respiratory journal drawing esada analyzed whether lack adequate oxygen night sleep indicator high blood pressure 2013 book clinical genomics practical applications adult patient care esada said example kind initiative affords excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource
[]
Test
10,312
3
The_Sacred_Armour_of_Antiriad:sacred armour antiriad sacred armour antiriad action game published palace software september 1986 amstrad cpc commodore 64 ibm pc compatibles trs-80 zx spectrum north america game published epyx rad warrior original game came 16-page comic book created graphic artist daniel malone game one earliest examples metroidvania genre developed without knowledge concurrently metroid sacred armour antiriad mixture platform maze game player controls tal start simply man dressed loincloth thrown rocks weapon later find legendary antiriad armour wear activate status panel bottom screen shows tal suit strength remaining lives in-game messages among things game-environment full dangerous creatures minions mysterious overlords tal defend hostile beings throwing rocks suit using suits beam-weapon capabilities located installed necessary equipment antiriad armour tal also needs find collect additions armour order allow fly shoot etc tal use suit explore game area occasionally need leave collect power re-charges suit come too-much attack suit destroyed power depleted 2086 civilization destroys nuclear armageddon two factions develop anti-radiation battlesuit completely immune conventional weapons go war diplomatic peace talks break following millennia survivors develop hardy peaceful race living quiet agricultural existence one day mysterious alien forces emerge old volcano containing prewar military base attack quickly conquering enslaving new breed humans forcing populace work mines many rebel mysterious overlords one rebels tal instructed elders seek-out legendary armoured suit sacred armour antiriad last word corruption anti-radiation fact one prewar battlesuits whose development originally instigated diplomatic crisis started nuclear war armour rumoured render wearer impervious attack help tal hopes defeat overthrow alien rulers earth however armour requires equipment added order make function fully include anti-gravity boots particle negator pulsar beam implosion mine last add-on important one needed destroy volcano enemy uses base
[ 6129, 9006 ]
Test
10,313
8
Search/Retrieve_Web_Service:search/retrieve web service search/retrieve web service srw web service search retrieval srw provides soap interface queries augment url interface provided companion protocol search/retrieve via url sru queries sru srw expressed using contextual query language cql standards srw sru cql promulgated united states library congress
[ 10020, 3979, 140, 2318, 8046, 113, 119, 10486, 3191, 8440, 8639 ]
Validation
10,314
6
Fdupes:fdupes fdupes program written adrián lópez scan directories duplicate files options list delete replace files hardlinks pointing duplicate first compares file sizes partial md5 signatures full md5 signatures performs byte-by-byte comparison verification fdupes written c released mit license
[ 2432, 3522, 1844, 2045 ]
Test
10,315
4
Distinguishing_attack:distinguishing attack cryptography distinguishing attack form cryptanalysis data encrypted cipher allows attacker distinguish encrypted data random data modern symmetric-key ciphers specifically designed immune attack words modern encryption schemes pseudorandom permutations designed ciphertext indistinguishability algorithm found distinguish output random faster brute force search considered break cipher similar concept known-key distinguishing attack whereby attacker knows key find structural property cipher transformation plaintext ciphertext random prove cryptographic function safe often compared random oracle function would random oracle attacker able predict output function function distinguishable random oracle non-random properties exists relation different outputs input output used attacker example find part input example let sequence random bits generated random oracle sequence generated pseudo-random bit generator two parties use one encryption system encrypt message length n bitwise xor next n bits respectively output encryption using truly random sequence distinguished output encryption appear random well sequence distinguishable encryption may reveal information m. two systems said indistinguishable exists algorithm connected either able decide whether connected t. distinguishing attack given algorithm d. broadly attack attacker given black box containing either instance system attack unknown key random object domain system aims emulate algorithm able tell whether system random object black box one attack example distinguishing attack stream cipher rc4 might one determines whether given stream bytes random generated rc4 unknown key classic examples distinguishing attack popular stream cipher itsik mantin adi shamir showed 2nd output byte rc4 heavily biased toward zero another example souradyuti paul bart preneel cosic shown xor value 1st 2nd outputs rc4 also non-uniform significantly theoretical biases demonstrable computer simulation
[ 7556, 2567, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 4389, 10662, 169, 11185, 2357, 10806, 1847, 9528, 2110, 9541, 6863, 8273, 7635, 212, 9556, 10963, 11349, 2265, 7643, 9697, 8674, 229, 618, 1898, 881, 1654, 7161, 7034, 892 ]
Test
10,316
3
PlayStation_2:playstation 2 playstation 2 officially abbreviated ps2 home video game console developed marketed sony computer entertainment first released japan march 4 2000 north america october 26 2000 europe australia november 2000 successor playstation well second video game console playstation brand sixth-generation console ps2 competed sega dreamcast nintendo gamecube microsoft xbox announced 1999 ps2 offered backwards compatibility predecessor dualshock controller well games ps2 best-selling video game console time sold 159 million units estimated ign 150 million confirmed sony 2011 3,800 game titles released ps2 since launch 1.5 billion copies sold sony later manufactured several smaller lighter revisions console known slimline models 2004 2006 sony announced launched successor playstation 3 even release successor ps2 remained popular well seventh generation continued produced january 4 2013 sony finally announced discontinued twelve years production – one longest lifespans video game console despite announcement new games console continued produced end 2013 including final fantasy xi seekers adoulin japan fifa 13 north america pro evolution soccer 2014 europe repair services system japan ended september 7 2018 though sony kept details playstation 2 development secret work console began around time original playstation released late 1994 insiders stated developed u.s. west coast former members argonaut software 1997 word leaked press console would backwards compatibility original playstation built-in dvd player internet connectivity sony announced playstation 2 ps2 march 1 1999 video game console positioned competitor sega dreamcast first sixth-generation console released although ultimately main rivals ps2 nintendo gamecube microsoft xbox dreamcast launched successfully north america later year selling 500,000 units within two weeks soon dreamcast north american launch sony unveiled playstation 2 tokyo game show september 20 1999 sony showed fully playable demos upcoming playstation 2 games including gran turismo 2000 later released tekken tag tournament showed console graphic abilities power ps2 launched march 2000 japan october north america november europe sales console games accessories pulled 250 million first day beating 97 million made first day dreamcast directly release difficult find ps2 units retailer shelves due manufacturing delays another option purchasing console online auction websites ebay people paid thousand dollars console ps2 initially sold well partly basis strength playstation brand console backward compatibility selling 980,000 units japan march 5 2000 one day launch allowed ps2 tap large install base established playstation another major selling point competition later sony added new development kits game developers ps2 units consumers ps2 built-in functionality also expanded audience beyond gamer debut pricing less standalone dvd player made console low cost entry home theater market success ps2 end 2000 caused sega problems financially competitively sega announced discontinuation dreamcast march 2001 18 months successful western launch despite dreamcast still received support 2001 ps2 remained sixth generation console eye future 6 months would face competition new rivals form nintendo gamecube microsoft xbox many analysts predicted close three-way matchup among three consoles xbox powerful hardware gamecube least expensive console nintendo changed policy encourage third-party developers playstation 2 theoretically weakest specification three head start due installed base plus strong developer commitment well built-in dvd player xbox required adapter gamecube lacked support entirely playstation 2 initial games lineup considered mediocre changed 2001 holiday season release several blockbuster games maintained ps2 sales momentum held newer rivals sony also countered xbox temporarily securing playstation 2 exclusives highly anticipated games grand theft auto series sony cut price console may 2002 us 299 199 north america making price gamecube 100 less xbox also planned cut price japan around time cut price twice japan 2003 2006 sony cut cost console anticipation release playstation 3 sony unlike sega dreamcast originally placed little emphasis online gaming first years although changed upon launch online-capable xbox coinciding release xbox live sony released playstation network adapter late 2002 several online first–party titles released alongside demonstrate active support internet play sony also advertised heavily online model support electronic arts ea ea offer online xbox titles 2004 although sony nintendo started late although followed decentralized model online gaming responsibility developer provide servers sony moves made online gaming major selling point ps2 september 2004 time launch sony revealed newer slimmer ps2 preparation launch new models scph-700xx-9000x sony stopped making older models scph-3000x-500xx let distribution channel empty stock units apparent manufacturing issue sony reportedly underestimated demand caused initial slowdown producing new unit caused part shortages time old units cleared new units ready issue compounded britain russian oil tanker became stuck suez canal blocking ship china carrying ps2s bound uk one week november british sales totalled 6,000 units compared 70,000 units weeks prior shortages 1,700 stores north america day christmas playstation 2 software distributed cd-rom dvd-rom addition console play audio cds dvd movies backwards compatible playstation games ps2 also supports playstation memory cards controllers although original playstation memory cards work original playstation games controllers may support functions analog buttons ps2 games standard playstation 2 memory card 8 mb capacity variety non-sony manufactured memory cards available playstation 2 allowing memory capacity larger standard 8 mb console also features 2 usb ports 1 ieee 1394 firewire port scph-10000 3900x hard disk drive installed expansion bay back console required play certain games notably popular final fantasy xi available certain models hardware uses emotion engine cpu custom-designed processor based mips architecture floating point performance 6.2 gflops custom-designed graphics synthesizer gpu fillrate 2.4 gigapixels/second capable rendering 75 million polygons per second accounting features lighting texture mapping artificial intelligence game physics real-world performance 3 million 16 million polygons per second playstation 2 may natively output video resolutions sdtv hdtv 480i 480p games gran turismo 4 tourist trophy known support up-scaled 1080i resolution using following standards composite video 480i s-video 480i rgb 480i/p vga progressive scan games ps2 linux component video display original playstation games native 240p mode hdtv sets support d-terminal cables available signal types cables also output analog stereo audio additionally rf modulator available system connect older tvs digital s/pdif audio may also output console via toslink connector outputs 2.0 pcm 5.1 channel sound dolby digital dts formats ps2 undergone many revisions internal construction others involving substantial external changes ps2 primarily differentiated models featuring original fat case design slimline models introduced end 2004 2010 sony bravia kdl-22px300 made available consumers 22 hd-ready television incorporated built-in playstation 2 ps2 standard color matte black several variations color produced different quantities regions including ceramic white light yellow metallic blue aqua metallic silver navy star blue opaque blue astral blue opaque black midnight black pearl white sakura purple satin gold satin silver snow white super red transparent blue ocean blue also limited edition color pink distributed regions oceania parts asia september 2004 sony unveiled third major hardware revision available late october 2004 smaller thinner quieter original versions included built-in ethernet port markets also integrated modem due thinner profile contain 3.5 expansion bay therefore support internal hard disk drive also lacked internal power supply later revision excluding japan version similar gamecube modified multitap expansion removal expansion bay criticized limitation due existence titles final fantasy xi required use hdd sony also manufactured consumer device called psx used digital video recorder dvd burner addition playing ps2 games device released japan december 13 2003 first sony product include xrossmediabar interface sell well japanese market released anywhere else class action lawsuit filed sony computer entertainment america inc. july 16 2002 superior court california county san mateo lawsuit addresses consumer reports inappropriate disc error disc read error messages problems associated playing dvds cds playstation 2 sony settled disc read error lawsuit compensating affected customers us 25 free game specified list reduced cost repair replacement scea discretion damaged system settlement subject courts approval hearings began us canada april 28 2006 may 11 2006 respectively playstation 2 software distributed cd-rom dvd-rom two formats differentiated color discs bottoms cd-roms blue dvd-roms silver playstation 2 offered particularly high-profile exclusive games main entries grand theft auto final fantasy metal gear solid series released exclusively console several prolific series got start playstation 2 including god war ratchet clank jak daxter devil may cry kingdom hearts sly cooper best-selling game console game releases peaked 2004 declined release playstation 3 2006 last new games console final fantasy xi seekers adoulin asia fifa 13 north america pro evolution soccer 2014 europe june 30 2007 total 10,035 software titles released worldwide counting games released multiple regions separate titles playstation 2 users option play select games internet using broadband internet connection playstation 2 network adaptor instead unified subscription-based online service like xbox live competitor microsoft later chose xbox console online multiplayer functionality playstation 2 responsibility game publisher ran third-party servers recent playstation 2 online games developed exclusively support broadband internet access xbox live similarly requires broadband internet connection playstation 2 sold 155 million units worldwide march 31 2013 europe sold 48 million units may 6 2008 according sony computer entertainment europe north america sold 50 million units december 2008 japan ps2 sold 21,454,325 units october 1 2008 according famitsu /enterbrain 2005 playstation 2 became fastest game console reach 100 million units shipped accomplishing feat within 5 years 9 months launch since surpassed playstation 4 playstation 2 dualshock 2 controller largely identical playstation dualshock basic functionality however includes analog pressure sensitivity face shoulder d-pad buttons replacing digital buttons original buttons would later become digital release dualshock 4 like predecessor dualshock 2 controller force feedback vibration functionality lighter includes two levels vibration optional hardware includes additional dualshock dualshock 2 controllers ps2 dvd remote control internal external hard disk drive hdd network adapter horizontal vertical stands playstation ps2 memory cards multitap playstation ps2 usb motion camera eyetoy usb keyboard mouse headset original ps2 multitap scph-10090 plugged newer slim models multitap connects memory card slot well controller slot memory card slot slimline shallower new slim-design multitaps scph-70120 manufactured models however third-party adapters also exist permit original multitaps used early versions ps2 could networked via i.link port though little game support dropped third party manufacturers created devices allow disabled people access ps2 ordinary switches etc third-party companies joytech produced lcd monitor speaker attachments ps2 attach back console allow users play games without access television long access mains electricity similar power source screens fold onto ps2 similar fashion laptop screens many accessories musical games dance pads dance dance revolution groove pump titles konami microphones use karaoke revolution games dual microphones sold used exclusively singstar games various guitar controllers guitar freaks series guitar hero series drum set controller sold box set guitar controller usb microphone use rock band guitar hero series world tour newer taiko drum controller specialized controllers include light guns guncon fishing rod reel controllers slime controller final fantasy x-2 tiny bee dual pistol controller katana controller resident evil 4 chainsaw controller unlike playstation requires use official sony playstation mouse play mouse-compatible games ps2 games mouse support work standard usb mouse well usb trackball addition games also support usage usb keyboard text input game control lieu dualshock dualshock 2 gamepad tandem usb mouse using homebrew programs possible play various audio video file formats ps2 homebrew programs also used play patched backups original ps2 dvd games unmodified consoles install retail discs installed hard drive older models homebrew emulators older computer gaming systems developed ps2 sony released linux-based operating system linux playstation 2 ps2 package also includes keyboard mouse ethernet adapter hdd europe australia ps2 comes free yabasic interpreter bundled demo disc allows users create simple programs ps2 port netbsd project blackrhino gnu/linux alternative debian-based distribution also available ps2
[ 4098, 3075, 3077, 7173, 8711, 10761, 7183, 528, 4112, 11287, 4124, 10780, 10287, 2096, 1587, 4152, 1599, 7234, 1091, 6732, 8782, 6738, 607, 1120, 1121, 5215, 6247, 5736, 6250, 6252, 6253, 6256, 5746, 11380, 5237, 7801, 10874, 9851, 6268, ...
None
10,317
6
FreeArc:freearc freearc free open-source high-performance file archiver developed bulat ziganshin beta version 0.666 released 2010 freearc next version development version fa 0.11 released october 2016. still current version next version supports 32- 64-bit windows linux includes zstandard support current status information released developers since 2016 website offline longer accessible project considered abandoned users sourceforge confirmed sources reddit software archived longer actively developed august 2019 freearc uses lzma prediction partial matching trueaudio tornado grzip algorithms automatic switching file type additionally uses filters improve compression including rep finds repetitions separations 1gb dict dictionary replacements text delta improves compression tables binary data bcj executables preproccesor lzp removes repetitions text 2010 tom hardware benchmarks comparing popular archivers freearc narrowly outperformed winzip 7-zip winrar best compression mode default compression tests lost 7-zip lzma2 still compressed better winrar winzip tom hardware tests freearc outpaced default settings 7zip lzma2 default compression also winrar even best compression settings freearc compression best settings slower 7zip winrar still came ahead winzip metric devised werner bergmans maximum compression benchmark freearc compression efficient programs classic formats like .z lzw .zip deflate .gz bzip2 scoring formula used non-public test multiplies sum compression decompression times factor exponentially grades ratio archive sizes achieved program test relative best known archive size data set november 2010 freearc top program benchmark followed nanozip bsc winrar works faster winrar 7zip like rar zip archiver data compressor like gzip bzip2 initially supported archive format normally identified codice_1 file name extension incompatible others relationship .arc formats recently decompression support archive types added including zip rar 7z freearc command line interface gui features include windows binaries available developer 64-bit variant version 0.666 october 2016 first public release freearc next released currently available cli application 32 64 bit windows linux platforms new features include
[ 3969, 5380, 9988, 6022, 10121, 1420, 6797, 1940, 3222, 9880, 546, 3876, 4777, 3114, 10027, 7983, 2864, 950, 823, 4406, 6713, 10817, 2755, 11076, 1352, 4296, 3659, 1101, 4174, 8909, 10575, 3921, 722, 4561, 8147, 2389, 10971, 3804, 11614, 1...
Test
10,318
2
Securelevel:securelevel securelevel security mechanism *bsd kernels optionally restrict certain capabilities securelevel controlled sysctl variable kern.securelevel value integer set value 0 enables certain class restrictions superuser process raise securelevel init process even freebsd lower used freebsd jails jail maintains securelevel addition global securelevel evaluated higher two securelevels used allows host environment run lower securelevel jails manipulate file flags jails may able compiled options regression new sysctl added freebsd kernel allows securelevel lowered purposes automated regression testing securelevel confused runlevel openbsd securelevels defined follows
[ 9540, 2399, 5492, 10036, 700, 9151 ]
None
10,319
0
Intelligent_character_recognition:intelligent character recognition computer science intelligent character recognition icr advanced optical character recognition ocr — rather specific — handwriting recognition system allows fonts different styles handwriting learned computer processing improve accuracy recognition levels icr software self-learning system referred neural network automatically updates recognition database new handwriting patterns extends usefulness scanning devices purpose document processing printed character recognition function ocr hand-written matter recognition process involved recognising hand writing accuracy levels may circumstances good achieve 97 accuracy rates reading handwriting structured forms often achieve high recognition rates several read engines used within software given elective voting rights determine true reading characters numeric fields engines designed read numbers take preference alpha fields engines designed read hand written letters higher elective rights used conjunction bespoke interface hub hand-written data automatically populated back office system avoiding laborious manual keying accurate traditional human data entry important development icr invention automated forms processing 1993 joseph corcoran awarded patent invention involved three-stage process capturing image form processed icr preparing enable icr engine give best results capturing information using icr engine finally processing results automatically validate output icr engine application icr increased usefulness technology made applicable use real world forms normal business applications modern software applications use icr technology recognizing text forms filled hand hand-printed intelligent word recognition iwr recognize extract ria printed-handwritten information cursive handwriting well icr recognizes character-level whereas iwr works full words phrases capable capturing unstructured information every day pages iwr said evolved hand print icr meant replace conventional icr ocr systems iwr optimized processing real-world documents contain mostly free-form hard-to-recognize data fields inherently unsuitable icr means highest best use iwr eliminate high percentage manual entry handwritten data run-on hand print fields documents otherwise could keyed humans
[ 8440, 5857, 1890, 1044 ]
Test
10,320
0
ALPAC:alpac alpac automatic language processing advisory committee committee seven scientists led john r. pierce established 1964 united states government order evaluate progress computational linguistics general machine translation particular report issued 1966 gained notoriety skeptical research done machine translation far emphasizing need basic research computational linguistics eventually caused u.s. government reduce funding topic dramatically alpac set april 1964 john r. pierce chairman committee consisted testimony heard alpac final recommendations p. 34 therefore research supported
[ 1890, 7780, 1289, 3323, 10557, 1883, 7164, 3389 ]
None
10,321
9
JMusic:jmusic jmusic open source music programming library written java programming language written andrew sorensen andrew brown jmusic released publicly november 1998 gnu gpl license designed assist composers music software developers providing support music data structures modifications input/output various file formats display notes sheet music see music notation jmusic data structure based musical score metaphor consists hierarchy notes phrases parts score jmusic also sound synthesis architecture instruments created chain audio objects similar unit generators languages jmusic score rendered jmusic instruments audio file
[ 9210, 5037 ]
None
10,322
4
Shavlik_Technologies:shavlik technologies shavlik technologies privately held company founded 1993 mark shavlik one original developers windows nt late 1980s early 1990s microsoft company provided software services network vulnerability assessment managing network security patches mark shavlik left role ceo shavlik technologies acquired vmware may 2011 held position vice president general manager vmware march 2013 april 2013 landesk purchased shavlik business unit rights shavlik products vmware period landesk announced partnership made vmware alliance partner 2017 landesk merged heat software created new software company called ivanti today shavlik name retired shavlik products vital ivanti security portfolio prior acceptance windows nt legitimate enterprise operating system late 1990s enterprise software written unix mainframe operating system shavlik roots providing consulting services help organizations make leap microsoft os contributed delivering products nt shavlik later extended services business software security consulting primarily businesses highly regulated industries banking healthcare services centered providing certified information systems security professional cissp perform security audits penetration testing early 2000s failure keep software up-to-date applying patches common flag audits one central challenges addressing problem companies easy way determine machines date methodology deploy updates era microsoft wrestled addressing issue internally wanted tool detect nt servers large nt server environment missing patches hot fixes see hotfix could installed machines however nt servers critical operations microsoft required process completed without installing extra software agent servers effort address hot fix issue shavlik built first agentless patch scanner windows nt product named hfnetchk acronym designating hotfix network check hfnetchk release followed another partnership wherein shavlik helped build microsoft baseline security analyzer mbsa tool minimal patch scanning along basic os configuration checks delivered microsoft part windows 2000 server toolkit hfnetchk pro 3.0 never released externally introduced ability scan missing patches also deploy patches eliminated need administrator apply patches manually 2003 shavlik brought hfnetchk market first time version 4 featured visual basic web friendly user interface previous versions hfnetchk operated via command line interface january 2003 sql slammer worm exploited vulnerability sql server allowed denial service slowed traffic many internet hosts crawl worm went viral affecting 75,000 systems first ten minutes microsoft made patch available six months prior indicating failure patch led widespread security breach vulnerability shavlik hfnetchk first product market could scan deploy missing patches windows machines aftermath sql slammer worm series highly publicized exploits hit 2003/2004 shavlik made decision move away consulting fully invest software development patch management products shavlik added standalone integrated anti-virus capabilities version 5 hfnetchk changed product name hfnetchk protect eventually dropping hfnetchk version 6 timeframe protect introduced capability patch offline virtual machines vm templates project first series partnerships shavlik entered vmware capability meant protect could agentlessly patch machines physical virtual environments version 7 various point releases new user interface introduced well physical virtual asset inventory agent support integrated protect longer offered separately licensed product shavlik also shifted detection logic protect content version 8 protect fixed many stability issues due number customer complaints shavlik focused making product stable version 9 introduced hypervisor patching vmware implementations well ability patch off-network machines via cloud shavlik technological advancements significant enough attract attention microsoft resulting cooperative efforts two companies development microsoft baseline security analyzer mbsa based shavlik hfnetchk acronym designating hotfix network checker released 2001 technology evolved still core technology current product offerings licensed multiple oem partners provide patch management capabilities variety management solutions combined install base millions users across globe late 2000s industry saw applications exploited hackers shift microsoft os microsoft applications third-party applications like java adobe music players non-microsoft internet browsers time products like microsoft system center configuration manager sccm provided windows patch capabilities via windows server update services wsus however n't still n't patch third-party products according global analyst firm gartner left administrators limited choices n't patch third-party products leaving network risk author test custom patch time third-party product requires update deploy patches manually affected machine april 2010 shavlik released scupdates – catalog patch content automated process building third-party patches delivering windows clients via integration microsoft system center updates publisher scup sccm tandem initial scupdates release microsoft shavlik also announced shavlik inclusion microsoft system center alliance 2010 shavlik released it.shavlik provided web-based front-end traditional shavlik toolkit asset inventory patch scanning patch deployment software service saas application simplified workflow inventory systems patching possible on-premises protect solution early 2009 shavlik formed oem partnership vmware build cloud-based application designed help administrators smaller businesses deploy virtual environment vmware go vgo intended onramp virtualization serving smaller customers ready upgrade sophisticated vcenter suite vgo originally brought market free-use cloud-based product vmware shavlik invested heavily vgo product expanded include asset inventory patch scanning advisor recommendation engine later attempts monetize vgo services paid version called vmware go pro introduced patch deployment led migration users it.shavlik vmware go vmware interest vgo well virtual infrastructure patching capabilities within protect led acquisition shavlik technologies may 2011 terms acquisition publicly disclosed january 2013 vmware announced intent sharpen focus software-defined data center hybrid cloud services part realignment vmware sought sell products n't contributing core business sliderocket presentation software non-key cloud virtualization technologies shavlik product line found list april 2013 landesk software purchased shavlik business unit rights shavlik products vmware time landesk announced partnership added vmware landesk list alliance partners shavlik move landesk triggered new investment shavlik patch microsoft system center formerly scupdates well products enhance experience companies using sccm early 2017 clearlake capital group acquired landesk shavlik along heat software appsense wavelink combined company uses new corporate name product brand ivanti
[ 10307, 5673, 6153, 8976, 5492, 2558 ]
Validation
10,323
4
Chargeware:chargeware chargeware seemingly valid looking mobile applications used charge user services without proper notification knowledge often focused internet pornography third-party porn apps downloaded onto user mobile device turn infecting phone malware known chargeware purpose chargeware manipulate user agreeing unclear terms fees charges applied without user full understanding consent chargeware deliberately difficult renege charges continue long possible without carrier interference 2013 hundreds thousands users primarily france uk experienced applications nature ultimately lead forms malware mobile device various countries spain encountered chargeware infections almost matched number adware infections japan lowest number chargeware infections country hackers reportedly learning market changing tactics i.e. mobile malware operations harder trace harder shut said markets also include specific countries since charging practices vary either country carrier basis
[ 10392, 877, 10141 ]
None
10,324
9
Essentials_of_Programming_Languages:essentials programming languages essentials programming languages eopl textbook programming languages daniel p. friedman mitchell wand christopher t. haynes eopl surveys principles programming languages operational perspective starts interpreter scheme simple functional core language similar lambda calculus systematically adds constructs addition example variable assignment thread-like control book illustrates increase expressive power programming language demand new constructs formulation direct interpreter book also demonstrates systematic transformations say store-passing style continuation-passing style eliminate certain constructs language interpreter formulated second part book dedicated systematic translation interpreter register machines transformations show eliminate higher-order closures continuation objects recursive function calls end reader left interpreter uses nothing tail-recursive function calls assignment statements plus conditionals becomes trivial translate code c program even assembly program bonus book shows pre-compute certain pieces meaning generate representation pre-computations since essence compilation book also prepares reader course principles compilation language translation related distinct topic apart text explaining key concepts book also comprises series exercises enabling readers explore alternative designs issues like sicp eopl represents significant departure prevailing textbook approach 1980s time book principles programming languages presented four six even programming languages discussed programming idioms implementation high level successful books typically covered algol 60 so-called algol family programming languages snobol lisp prolog even today fair number textbooks programming languages surveys though scope narrowed eopl started 1983 indiana one leading departments programming languages research eugene kohlbecker one friedman phd students transcribed collected 311 lectures faculty members including mitch wand christopher haynes started contributing turned hitchhiker guide meta-universe —as kohlbecker called it—into systematic interpreter transformation-based survey 25 years existence book become near-classic third edition including additional topics types modules first part incorporates ideas programming htdp another unconventional textbook uses scheme teach principles program design authors well matthew flatt recently provided drracket plug-ins language levels teaching eopl eopl spawned least two related texts queinnec lisp small pieces krishnamurthi
[ 10083, 8421, 6502, 4839, 8262, 10569, 1610, 4846, 6767, 2964, 9304, 10395, 6047 ]
Test
10,325
3
Network_Computer_Reference_Profile:network computer reference profile network computer reference profile nc reference profile ncrp specification network computer put forward oracle corporation endorsed sun microsystems ibm apple computer netscape finalized 1996 first version specification known nc1 reference profile ncrp specified minimum hardware requirements software protocols among software requirements support ip-based protocols tcp/ip ftp etc www standards http html java email protocols multimedia file formats security standards operating systems used ncos javaos minimum hardware requirements although initial nc standard intended promote diskless workstation model computing preclude computers additional features ability operate either diskless workstation conventional fat client thus ordinary personal computer pc required features could technically classified network computer indeed sun noted contemporary pcs indeed meet nc reference requirements reference profile subsequently revised use strongarm processor trip ellison acer group headquarters 1996 realised importance industry products based intel x86-compatible processors nci president jerry baker noted nobody corporate users ever heard arm chip many ncs operated via protocols bootp dhcp rarp nfs isp-bound lan-based reference implementation ncs smartcard option available allowed user authentication performed secure manner ssl providing transport security smartcard also provided minimal local storage isp dialup configuration settings configuration data required lan-based ncs network computer brand created oracle ncrp specification
[ 3297, 9665, 7364, 4679, 10926, 7983, 9745, 10481, 499, 2996, 10548, 5433, 3323, 2558, 5375 ]
None
10,326
1
Relation_(database):relation database relational database theory relation originally defined e. f. codd set tuples ... element member data domain codd original definition notwithstanding contrary usual definition mathematics ordering elements tuples relation instead element termed attribute value attribute name paired domain nowadays commonly referred type data type attribute value attribute name paired element attribute domain tuple set attribute values two distinct elements name thus accounts tuple described function mapping names values set attributes two distinct elements name called heading set tuples heading called body relation thus heading paired body heading relation also heading tuple body number attributes constituting heading called degree term also applies tuples relations term n -tuple refers tuple degree n n ≥ 0 e. f. codd used term relation mathematical sense finitary relation set tuples set n sets ... thus n -ary relation interpreted closed world assumption extension n -adic predicate n -tuples whose values substituted corresponding free variables predicate yield propositions hold true appear relation term relation schema refers heading paired set constraints defined terms heading relation thus seen instantiation relation schema heading schema satisfies applicable constraints sometimes relation schema taken include name relational database definition database schema sometimes referred relational schema thus thought collection named relation schemas implementations domain attribute effectively data type named relation schema effectively relation variable relvar short sql database language relational databases relations represented tables row table represents single tuple values attribute form column example relation three named attributes 'id domain integers 'name 'address domain strings predicate relation using attribute names denote free variables might employee number id known name lives address examination relation tells us four tuples predicate holds true example employee 102 known name yonezawa akinori live anywhere else naha okinawa also apart four employees shown employee name address definition body tuples body appear particular order one say tuple 'murata makoto tuple 'matsumoto yukihiro one say tuple 'yonezawa akinori first tuple similar comment applies rows sql table definition heading attributes element appear particular order either therefore elements tuple similar comment apply sql define ordering columns table relational database consists named relation variables relvars purposes updating database response changes real world update single relvar causes body relation assigned variable replaced different set tuples relvars classified two classes base relation variables derived relation variables latter also known virtual relvars usually referred short term view base relation variable relation variable derived relation variables sql term base table equates approximately base relation variable view defined expression using operators relational algebra relational calculus expression operates one relations evaluated yields another relation result sometimes referred derived relation operands relations assigned database variables view defined giving name expression name subsequently used variable name note expression must mention least one base relation variable using data definition language ddl able define base relation variables sql codice_1 syntax used define base tables following example data definition language ddl also used define derived relation variables sql codice_2 syntax used define derived relation variable following example
[ 10628, 10632, 8201, 8979, 2068, 10389, 7446, 11030, 2456, 1049, 5658, 5403, 9112, 10137, 4255, 9248, 9631, 9634, 10145, 1447, 2344, 4263, 7080, 10793, 10413, 10286, 9397, 10294, 3004, 1341, 7868, 11324, 10048, 2369, 5953, 6850, 8130, 2246, ...
Validation
10,327
3
Ultra_1:ultra 1 ultra 1 family sun microsystems workstations based 64-bit ultrasparc microprocessor first model sun ultra series sun computers succeeded sparcstation series launched 1995 shipped solaris 2.5 capable running operating systems linux bsd ultra 1 available variety different specifications three different cpu speeds available 143 mhz model 140 167 mhz model 170 200 mhz model 200 ultra 1 creator3d 170e launched november 1995 list price us 27,995 model numbers e suffix sun service code a12 internal codename electron two instead three sbus slots added upa slot allow use optional creator framebuffer addition e models wide scsi fast ethernet interfaces place narrow scsi 10base-t ethernet standard ultra 1 service code a11 codename neutron ultra 1 uses 200-pin 5v ecc 60ns simm pairs similar sun machines netra 1 servers chassis ultraserver 1/ultra enterprise 1 servers
[ 3328, 9731, 1801, 4235, 1809, 2710, 1316, 10789, 1707, 3247, 6322, 823, 7104, 9665, 6338, 10436, 8007, 1480, 2895, 597, 10200, 4960, 9955, 11363, 11626, 7148, 7022, 8179, 11636, 9333, 1399, 9343 ]
None
10,328
3
Blasteroids:blasteroids blasteroids third official sequel 1979 shoot 'em video game asteroids developed atari games released coin-operated game 1987 unlike previous games blasteroids uses raster graphics vector graphics home computer ports blasteroids released image works amiga amstrad cpc atari st commodore 64 msx ms-dos zx spectrum additionally though appeared midway arcade compilation prior emulated version blasteroids included lego dimensions unlockable mini-game gameplay game basically original player players case 2-player game controls spaceship viewed 2d representation space rotating ship using thrust give ship momentum slow completely stop moving player rotate ship face direction came generate right amount thrust nullify momentum ship limited amount fuel generate thrust fuel comes form energy also used ship shields protect collisions enemy fire energy gone player ship destroyed ship shoot destroy asteroids enemy ships ship also transformed 3 different versions namely speeder fastest version fighter firepower warrior extra armour start game player screen four warps indicating game difficulty easy medium hard expert flying warps starts game difficulty several galaxies 9 16 sectors depending difficulty sector completed destroying asteroids exit portal appears lead player galactic map screen similarly difficulty screen player choose sector visit next completed empty sectors revisited costs energy sectors currently range marked sector consists visible screen wraparound object game destroy asteroids set speed fly sector asteroids come varying sizes shot larger asteroids break multiple smaller ones shooting smallest ones actually remove sector asteroids also come different types normal asteroids n't contain anything red asteroids contain power-ups form power crystals released completely destroying asteroids crystals decay time popcorn asteroids require several hits expands size eventually makes stop spinning ca n't destroyed stopping enough finish sector egg asteroids contain leeches home user ship suck energy shot destroyed finally seeker asteroids home player ship shot besides asteroids different enemy ships trying shoot player leave equipment form power-ups destroyed different kinds equipment mukor alien boss sectors cleared asteroids try ram player send miniature enemy ships aid mukor tentacles must shot multiple times destroyed tentacles gone mukor defeated leave special equipment reappear next galaxy larger number tentacles making harder defeat mukor must defeated galaxies fully conquered player win game second player join game time pressing fire button using 1 credit turning blasteroids multiplayer game players cooperate covering well docking ships starlet docking possible one ship speeder warrior flying turn speeder stationary turret firepower top warrior turns spiaret less firepower full control ships undock either player transforms ship something else first player exit exit portal gets large bonus control galactic map
[ 2530, 10931, 9166, 9006 ]
Test
10,329
4
Wired_Equivalent_Privacy:wired equivalent privacy wired equivalent privacy wep security algorithm ieee 802.11 wireless networks introduced part original 802.11 standard ratified 1997 intention provide data confidentiality comparable traditional wired network wep recognizable key 10 26 hexadecimal digits 40 104 bits one time widely use often first security choice presented users router configuration tools 2003 wi-fi alliance announced wep superseded wi-fi protected access wpa 2004 ratification full 802.11i standard i.e wpa2 ieee declared wep-40 wep-104 deprecated wep encryption protocol available 802.11a 802.11b devices built wpa standard available 802.11g devices however 802.11b devices later provided firmware software updates enable wpa newer devices built wep ratified wi-fi security standard 1999 first versions wep particularly strong even time released u.s. restrictions export various cryptographic technology led manufacturers restricting devices 64-bit encryption restrictions lifted increased 128-bit despite introduction 256-bit wep 128-bit remains one common implementations wep included privacy component original ieee 802.11 standard ratified 1997 wep uses stream cipher rc4 confidentiality crc-32 checksum integrity deprecated 2004 documented current standard standard 64-bit wep uses 40 bit key also known wep-40 concatenated 24-bit initialization vector iv form rc4 key time original wep standard drafted u.s. government export restrictions cryptographic technology limited key size restrictions lifted manufacturers access points implemented extended 128-bit wep protocol using 104-bit key size wep-104 64-bit wep key usually entered string 10 hexadecimal base 16 characters 0–9 a–f character represents 4 bits 10 digits 4 bits gives 40 bits adding 24-bit iv produces complete 64-bit wep key 4 bits × 10 24 bits iv 64 bits wep key devices also allow user enter key 5 ascii characters 0–9 a–z a–z turned 8 bits using character byte value ascii 8 bits × 5 24 bits iv 64 bits wep key however restricts byte printable ascii character small fraction possible byte values greatly reducing space possible keys 128-bit wep key usually entered string 26 hexadecimal characters 26 digits 4 bits gives 104 bits adding 24-bit iv produces complete 128-bit wep key 4 bits × 26 24 bits iv 128 bits wep key devices also allow user enter 13 ascii characters 8 bits × 13 24 bits iv 128 bits wep key 152-bit 256-bit wep systems available vendors wep variants 24 bits iv leaving 128 232 bits actual protection 128 232 bits typically entered 32 58 hexadecimal characters 4 bits × 32 24 bits iv 152 bits wep key 4 bits × 58 24 bits iv 256 bits wep key devices also allow user enter 16 29 ascii characters 8 bits × 16 24 bits iv 152 bits wep key 8 bits × 29 24 bits iv 256 bits wep key two methods authentication used wep open system authentication shared key authentication open system authentication wlan client provide credentials access point authentication client authenticate access point attempt associate effect authentication occurs subsequently wep keys used encrypting data frames point client must correct keys shared key authentication wep key used authentication four-step challenge-response handshake authentication association pre-shared wep key also used encrypting data frames using rc4 first glance might seem though shared key authentication secure open system authentication since latter offers real authentication however quite reverse possible derive keystream used handshake capturing challenge frames shared key authentication therefore data easily intercepted decrypted shared key authentication open system authentication privacy primary concern advisable use open system authentication wep authentication rather shared key authentication however also means wlan client connect ap authentication mechanisms weak shared key wep deprecated favor wpa/wpa2 rc4 stream cipher traffic key must never used twice purpose iv transmitted plain text prevent repetition 24-bit iv long enough ensure busy network way iv used also opened wep related key attack 24-bit iv 50 probability iv repeat 5000 packets august 2001 scott fluhrer itsik mantin adi shamir published cryptanalysis wep exploits way rc4 ciphers iv used wep resulting passive attack recover rc4 key eavesdropping network depending amount network traffic thus number packets available inspection successful key recovery could take little one minute insufficient number packets sent ways attacker send packets network thereby stimulate reply packets inspected find key attack soon implemented automated tools since released possible perform attack personal computer off-the-shelf hardware freely available software aircrack-ng crack wep key minutes cam-winget et al surveyed variety shortcomings wep write experiments field show proper equipment practical eavesdrop wep-protected networks distances mile target also reported two generic weaknesses 2005 group u.s. federal bureau investigation gave demonstration cracked wep-protected network 3 minutes using publicly available tools andreas klein presented another analysis rc4 stream cipher klein showed correlations rc4 keystream key ones found fluhrer mantin shamir additionally used break wep wep-like usage modes 2006 bittau handley lackey showed 802.11 protocol used wep enable earlier attacks previously thought impractical eavesdropping single packet attacker rapidly bootstrap able transmit arbitrary data eavesdropped packet decrypted one byte time transmitting 128 packets per byte decrypt discover local network ip addresses finally 802.11 network connected internet attacker use 802.11 fragmentation replay eavesdropped packets crafting new ip header onto access point used decrypt packets relay buddy internet allowing real-time decryption wep traffic within minute eavesdropping first packet 2007 erik tews andrei pychkine ralf-philipp weinmann able extend klein 2005 attack optimize usage wep new attack possible recover 104-bit wep key probability 50 using 40,000 captured packets 60,000 available data packets success probability 80 85,000 data packets 95 using active techniques like deauth arp re-injection 40,000 packets captured less one minute good conditions actual computation takes 3 seconds 3 mb main memory pentium-m 1.7 ghz additionally optimized devices slower cpus attack used 40-bit keys even higher success probability 2008 payment card industry pci security standards council latest update data security standard dss prohibits use wep part credit-card processing 30 june 2010 prohibits new system installed uses wep 31 march 2009 use wep contributed tj maxx parent company network invasion use encrypted tunneling protocols e.g ipsec secure shell provide secure data transmission insecure network however replacements wep developed goal restoring security wireless network recommended solution wep security problems switch wpa2 wpa intermediate solution hardware could support wpa2 wpa wpa2 much secure wep add support wpa wpa2 old wi-fi access points might need replaced firmware upgraded wpa designed interim software-implementable solution wep could forestall immediate deployment new hardware however tkip basis wpa reached end designed lifetime partially broken officially deprecated release 802.11-2012 standard stopgap enhancement wep present early 802.11i drafts implementable hardware able handle wpa wpa2 extended iv key values 128 bits hoped eliminate duplicate iv deficiency well stop brute force key attacks became clear overall wep algorithm deficient iv key sizes would require even fixes wep2 name original algorithm dropped two extended key lengths remained eventually became wpa tkip wepplus also known wep+ proprietary enhancement wep agere systems formerly subsidiary lucent technologies enhances wep security avoiding weak ivs completely effective wepplus used ends wireless connection easily enforced remains serious limitation also necessarily prevent replay attacks ineffective later statistical attacks rely weak ivs dynamic wep refers combination 802.1x technology extensible authentication protocol dynamic wep changes wep keys dynamically vendor-specific feature provided several vendors 3com dynamic change idea made 802.11i part tkip actual wep algorithm
[ 7426, 262, 3084, 4364, 9356, 2961, 1941, 1814, 5659, 4514, 9640, 1067, 8497, 11185, 7222, 5561, 5437, 6466, 584, 8909, 2006, 1114, 10332, 8286, 7135, 3300, 4580, 10341, 11241, 2154, 10346, 10349, 8694, 6779, 8828, 5373, 2430 ]
Test
10,330
2
Modern_Combat:_Sandstorm:modern combat sandstorm modern combat sandstorm 2009 first-person shooter developed published gameloft ios webos bada android first game modern combat series followed 2010 2011 2012 2014 game set middle east sandstorm plays similarly game features ten missions varied environments different tasks players complete main enemies game terrorists often player accompanied soldiers fight alongside movement controlled virtual joystick screen sight aim controlled scrolling across touchscreen players also crouch throw grenades use iron sights reload change weapons shoot using virtual buttons touchscreen controls customized main menu online multiplayer ability added sandstorm free update january 28 2010 chief warrant officer mike chief warrens returns injury active duty war terrorism middle east reunites old squad dozer ryan fox captain jones completing training run chief joins squad head destroy terrorist radio outpost successfully completing mission await evacuation disused hotel extraction helicopter shot forced defend hotel safely extracted humvee mission squad notice terrorists seemed ready coming conclusion someone leaking information sent hospital capture abu bahaa terrorist warlord chief dozer infiltrate hospital sewer system ryan jones wait outside reaching bahaa room chief discovers tricked hospital rigged explosives dummy placed bahaa hospital bed chief dozer manage escape unscathed outside jones injured ryan killed jones recovers squad break dockyard bahaa using store large nuclear weapon discover terrorists enormous base underground entrance hidden within metal freight container chief sent find nuke encounters bahaa inside forced allow escape locate bomb could detonated terrorists minute eventually finds able secure bahaa flees attempts escape truck squad pursue humvee chasing dockyard train tunnel eventually flipping truck reaches highway squad find bahaa lying truck still alive dozer prepares secure however jones betrays squad killing dozer taking fox hostage bahaa taunts chief saying weak choice surrender chief shoots jones falls ground fox bahaa pulls two grenades jacket prepares blow chief fox pulls ground tells chief run chief takes cover humvee bahaa fox killed explosion chief subsequently promoted becomes hero returning us travels fox residence meets wife informing husband act martyrdom saved life variety weapons modern combat sandstorm range two assault rifles one higher rate fire movement speed lacking power accuracy comparison smg shotgun sniper rifle rpg weapons found stored crates often inside side building along path indicated missions weapons include m16a3 mp5a2 m870 ak-47 m24 sws m249 rpg-7 high-definition version game released april 1 2010 ipad features updated controls graphics make use ipad larger screen upon release sandstorm received extremely positive reviews ios version holds aggregate score 83 gamerankings based seven reviews ign mark bozon scored 8.5 10 calling game pushes system gamers would expect possible ... sandstorm nice blending power manageable touch controls ends way game 'd expect find mere 6.99 ... 're willing put little time learning controls sandstorm impressive shooter proof iphone handle fps gaming 148apps equally impressed scoring 4 5 praising graphics modern combat features impressive 3d graphics iphone best graphics best period textures surprisingly detailed character models great annoying pop-up however less impressed gameplay mission structure simply linear map narrow little choice movement blatant green arrows also guide preventing hope exploration appspy dave flodine scored game 5 5 believing set new bar first person shooters idevices modern combat sandstorm mold future fpss iphone cast game without issues offering workable control scheme superb presentation solid play length could n't ask better title satisfy iphone fps cravings pocket gamer jon jordan similarly impressed scoring game 8 10 giving silver award especially impressed control schemes really clever way gameloft shaped gameplay modern combat sandstorm turn limitations iphone comes first person shooters notably touch controls game strength slide play chris reed scored game 4 4 also believing game set new standard idevices gaming experience modern combat sandstorm great one controls best 've seen iphone fps graphics beautiful plenty level variety sure 've seen idevice never small price like first-person shooters buy game eli hodapp toucharcade scored game 4 5 expressing similar sentiments pocket gamer slide play modern combat sandstorm excellent game raises bar expected future first person shooters iphone well added short list games fantastic on-screen controls ... 're interested shooters looking great game flex muscles iphone look modern combat sandstorm touchgen matt dunn slightly less impressed reviewers scored game 3.5 5 critical ai really n't much way ai modern combat story story modern combat bland best generic terrorist driven plot descent twist end game makes attempt suck connect squad-mates hard really care ... dialogue storyline feel like written someone knows little armed forces wrote story based war games 've played praised graphics textures crisp look great close gun models reloading/first-person character animations awesome controls everything feels accessible logical
[ 10080, 9732, 6539, 7029, 6940 ]
None
10,331
4
Vectra_AI:vectra ai vectra ai inc. applies artificial intelligence detects responds hidden cyberattackers inside cloud data center enterprise networks company ’ cognito platform designed detect cyberattacker behaviors infrastructures allow security analysts conduct incident investigations hunt hidden threats using security-enriched metadata augment cognito platform vectra threat researchers identify investigate cyberattacks vulnerabilities malicious behaviors unknown world data sets research data scientists develop machine learning algorithms behavioral analysis drive cognito platform investors vectra include khosla ventures tcv accel partners ia ventures ame cloud ventures dag ventures wipro ventures atlantic bridge ireland strategic investment fund nissho electronics silver lake vectra founded 2010 tracevector llc new york city incorporated 2012 name vectra networks company headquartered san jose calif. facilities austin texas cambridge mass. switzerland germany ireland united kingdom france vectra ’ team includes threat researchers white hats data scientists security engineers user interface designers key executives hitesh sheth president chief executive officer oliver tavakoli chief technology officer howie shohet chief financial officer kevin moore senior vice president worldwide field operations didi dayton vice president worldwide channels alliances jennifer wang vice president customer success mike banic vice president marketing kevin kennedy vice president product management jason kehl vice president engineering aaron bean vice president human resources gerard bauer vice president emea sales board members include hitesh sheth president ceo vectra kevin dillon co-founder managing partner atlantic bridge charles giancarlo ceo pure storage brad gillespie general partner ia ventures jim messina founder ceo messina group bruce armstrong operating partner kholsa ventures eric wolford venture partner accel partners cognito platform vectra provides continuous automated threat surveillance expose hidden unknown cyberattackers actively spread inside networks cognito analyzes network traffic private data centers public clouds enterprise environments detect hidden cyberattacker behaviors cognito platform identifies prioritizes threat detections based severity certainty scores empowers security teams prevent data loss quickly mitigating serious attacks first threat behaviors cyberattack techniques detected cognito include botnet command-and-control communications botnet monetization internal reconnaissance lateral movement data theft exfiltration vectra offers three applications cognito platform address use cases using ai incident detection triage security operations center helped one vectra customer – texas university system – resolve incident 10 20 minutes rather hours days vectra ai combines data science machine learning network behavioral analysis technologies identify patterns characterize malicious behavior within network cognito uses artificial intelligence including supervised learning unsupervised machine learning deep learning techniques detect respond advanced cyberattacks remediation actions taken security information event management siems firewalls endpoint security enforcement network access control orchestration integrated cognito via application programming interface vectra issued ten u.s. patents advanced cyber security analytics capabilities automated ai vectra publishes attacker behavior industry reports provide analysis active persistent attacker behaviors inside enterprise networks vectra customers reports examine wide range cyberattack detections trends 300+ vectra customersfrom nine different industries reports span strategic phases attack lifecycle vectra customers received industry recognition including
[ 8998, 2953, 4883, 11611, 5373 ]
Test
10,332
4
Wi-Fi_Protected_Access:wi-fi protected access wi-fi protected access wpa wi-fi protected access ii wpa2 wi-fi protected access 3 wpa3 three security protocols security certification programs developed wi-fi alliance secure wireless computer networks alliance defined response serious weaknesses researchers found previous system wired equivalent privacy wep wpa sometimes referred draft ieee 802.11i standard became available 2003 wi-fi alliance intended intermediate measure anticipation availability secure complex wpa2 became available 2004 common shorthand full ieee 802.11i ieee 802.11i-2004 standard january 2018 wi-fi alliance announced release wpa3 several security improvements wpa2 wi-fi alliance intended wpa intermediate measure take place wep pending availability full ieee 802.11i standard wpa could implemented firmware upgrades wireless network interface cards designed wep began shipping far back 1999 however since changes required wireless access points aps extensive needed network cards pre-2003 aps could upgraded support wpa wpa protocol implements much ieee 802.11i standard specifically temporal key integrity protocol tkip adopted wpa wep used 64-bit 128-bit encryption key must manually entered wireless access points devices change tkip employs per-packet key meaning dynamically generates new 128-bit key packet thus prevents types attacks compromised wep wpa also includes message integrity check designed prevent attacker altering resending data packets replaces cyclic redundancy check crc used wep standard crc main flaw provide sufficiently strong data integrity guarantee packets handled well tested message authentication codes existed solve problems required much computation used old network cards wpa uses message integrity check algorithm called tkip verify integrity packets tkip much stronger crc strong algorithm used wpa2 researchers since discovered flaw wpa relied older weaknesses wep limitations message integrity code hash function named michael retrieve keystream short packets use re-injection spoofing wpa2 replaced wpa wpa2 requires testing certification wi-fi alliance implements mandatory elements ieee 802.11i particular includes mandatory support ccmp aes-based encryption mode certification began september 2004 march 13 2006 wpa2 certification mandatory new devices bear wi-fi trademark january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface wpa designed specifically work wireless hardware produced prior introduction wpa protocol provides inadequate security wep devices support wpa applying firmware upgrades available legacy devices wi-fi devices certified since 2006 support wpa wpa2 security protocols wpa2 may work older network cards different wpa versions protection mechanisms distinguished based target end-user according method authentication key distribution encryption protocol used originally eap-tls extensible authentication protocol transport layer security certified wi-fi alliance april 2010 wi-fi alliance announced inclusion additional eap types wpa- wpa2- enterprise certification programs ensure wpa-enterprise certified products interoperate one another 802.1x clients servers developed specific firms may support eap types certification attempt popular eap types interoperate failure one major issues preventing rollout 802.1x heterogeneous networks commercial 802.1x servers include microsoft internet authentication service juniper networks steelbelted radius well aradial radius server freeradius open source 802.1x server pre-shared key wpa wpa2 remain vulnerable password cracking attacks users rely weak password passphrase wpa passphrase hashes seeded ssid name length rainbow tables exist top 1,000 network ssids multitude common passwords requiring quick lookup speed cracking wpa-psk brute forcing simple passwords attempted using aircrack suite starting four-way authentication handshake exchanged association periodic re-authentication wpa3 replaces cryptographic protocols susceptible off-line analysis protocols require interaction infrastructure guessed password supposedly placing temporal limits number guesses however design flaws wpa3 enables attackers plausibly launch brute-force attacks see dragonblood attack wpa wpa2 n't provide forward secrecy meaning adverse person discovers pre-shared key potentially decrypt packets encrypted using psk transmitted future even past could passively silently collected attacker also means attacker silently capture decrypt others packets wpa-protected access point provided free charge public place password usually shared anyone place words wpa protects attackers n't access password safer use transport layer security tls similar top transfer sensitive data however starting wpa3 issue addressed mathy vanhoef frank piessens significantly improved upon wpa-tkip attacks erik tews martin beck demonstrated inject arbitrary amount packets packet containing 112 bytes payload demonstrated implementing port scanner executed client using wpa-tkip additionally showed decrypt arbitrary packets sent client mentioned used hijack tcp connection allowing attacker inject malicious javascript victim visits website contrast beck-tews attack could decrypt short packets mostly known content arp messages allowed injection 3 7 packets 28 bytes beck-tews attack also requires quality service defined 802.11e enabled vanhoef-piessens attack neither attack leads recovery shared session key client access point authors say using short rekeying interval prevent attacks strongly recommend switching tkip aes-based ccmp halvorsen others show modify beck-tews attack allow injection 3 7 packets size 596 bytes downside attack requires substantially time execute approximately 18 minutes 25 seconds work vanhoef piessens showed wpa used encrypt broadcast packets original attack also executed important extension substantially networks use wpa protect broadcast packets protect unicast packets execution time attack average around 7 minutes compared 14 minutes original vanhoef-piessens beck-tews attack vulnerabilities tkip significant wpa-tkip held extremely safe combination indeed wpa-tkip still configuration option upon wide variety wireless routing devices provided many hardware vendors survey 2013 showed 71 still allow usage tkip 19 exclusively support tkip serious security flaw revealed december 2011 stefan viehböck affects wireless routers wi-fi protected setup wps feature regardless encryption method use recent models feature enable default many consumer wi-fi device manufacturers taken steps eliminate potential weak passphrase choices promoting alternative methods automatically generating distributing strong keys users add new wireless adapter appliance network methods include pushing buttons devices entering 8-digit pin wi-fi alliance standardized methods wi-fi protected setup however pin feature widely implemented introduced major new security flaw flaw allows remote attacker recover wps pin router wpa/wpa2 password hours users urged turn wps feature although may possible router models also pin written label wi-fi routers wps changed compromised wpa3 introduces new alternative configuration devices lack sufficient user interface capabilities allowing nearby devices serve adequate ui network provisioning purposes thus mitigating need wps several weaknesses found ms-chapv2 severely reduce complexity brute-force attacks making feasible modern hardware 2012 complexity breaking ms-chapv2 reduced breaking single des key work moxie marlinspike marsh ray moxie advised enterprises depending mutual authentication properties ms-chapv2 connection wpa2 radius servers immediately start migrating something else tunneled eap methods using ttls peap encrypt mschapv2 exchange widely deployed protect exploitation vulnerability however prevalent wpa2 client implementations early 2000s prone misconfiguration end users cases e.g android lacked user-accessible way properly configure validation aaa server certificate cns extended relevance original weakness mschapv2 within mitm attack scenarios stricter wpa2 compliance tests announce alongside wpa3 certified client software required conform certain behaviors surrounding aaa certificate validation hole196 vulnerability wpa2 protocol abuses shared group temporal key gtk used conduct man-in-the-middle denial-of-service attacks however assumes attacker already authenticated access point thus possession gtk 2016 shown wpa wpa2 standards contain insecure expository random number generator rng researchers showed vendors implement proposed rng attacker able predict group key gtk supposed randomly generated access point ap additionally showed possession gtk enables attacker inject traffic network allowed attacker decrypt internet traffic transmitted wireless network demonstrated attack asus rt-ac51u router uses mediatek out-of-tree drivers generate gtk showed gtk recovered within two minutes less similarly demonstrated keys generated broadcom access daemons running vxworks 5 later recovered four minutes less affects example certain versions linksys wrt54g certain apple airport extreme models vendors defend attack using secure rng hostapd running linux kernels vulnerable attack thus routers running typical openwrt lede installations exhibit issue october 2017 details krack key reinstallation attack attack wpa2 published krack attack believed affect variants wpa wpa2 however security implications vary implementations depending upon individual developers interpreted poorly specified part standard software patches resolve vulnerability available devices april 2019 serious design flaws wpa3 found allow attackers perform downgrade attacks side-channel attacks enabling brute-forcing passphrase well launching denial-of-service attacks wi-fi base stations
[ 5892, 6916, 262, 3462, 7556, 7049, 3084, 4364, 9356, 3984, 2580, 1941, 1814, 5270, 5659, 5671, 9640, 1067, 4396, 6187, 8237, 10924, 7857, 434, 3762, 8497, 5561, 11321, 1083, 5437, 5439, 2430, 4163, 3780, 6466, 1608, 8266, 10058, 8909, 225...
Validation
10,333
2
Segmentation_fault:segmentation fault computing segmentation fault often shortened segfault access violation fault failure condition raised hardware memory protection notifying operating system os software attempted access restricted area memory memory access violation standard x86 computers form general protection fault os kernel response usually perform corrective action generally passing fault offending process sending process signal processes cases install custom signal handler allowing recover otherwise os default signal handler used generally causing abnormal termination process program crash sometimes core dump segmentation faults common class error programs written languages like c provide low-level memory access arise primarily due errors use pointers virtual memory addressing particularly illegal access another type memory access error bus error also various causes today much rarer occur primarily due incorrect physical memory addressing due misaligned memory access – memory references hardware address rather references process allowed address many programming languages may employ mechanisms designed avoid segmentation faults improve memory safety example rust programming language appeared 2010 employs 'ownership based model ensure memory safety garbage collection employed since around 1960 avoids certain classes memory errors could lead segmentation faults segmentation fault occurs program attempts access memory location allowed access attempts access memory location way allowed example attempting write read-only location overwrite part operating system term segmentation various uses computing context segmentation fault term used since 1950s refers address space program memory protection program address space readable stack read-write portion data segment program writable read-only data code segment writable thus attempting read outside program address space writing read-only segment address space results segmentation fault hence name systems using hardware memory segmentation provide virtual memory segmentation fault occurs hardware detects attempt refer non-existent segment refer location outside bounds segment refer location fashion allowed permissions granted segment systems using paging invalid page fault generally leads segmentation fault segmentation faults page faults faults raised virtual memory management system segmentation faults also occur independently page faults illegal access valid page segmentation fault invalid page fault segmentation faults occur middle page hence page fault example buffer overflow stays within page illegally overwrites memory hardware level fault initially raised memory management unit mmu illegal access referenced memory exists part memory protection feature invalid page fault referenced memory exist problem invalid logical address instead invalid physical address bus error raised instead though always distinguished operating system level fault caught signal passed offending process activating process handler signal different operating systems different signal names indicate segmentation fault occurred unix-like operating systems signal called sigsegv abbreviated segmentation violation sent offending process microsoft windows offending process receives status_access_violation exception conditions segmentation violations occur manifest specific hardware operating system different hardware raises different faults given conditions different operating systems convert different signals passed processes proximate cause memory access violation underlying cause generally software bug sort determining root cause – debugging bug – simple cases program consistently cause segmentation fault e.g. dereferencing null pointer cases bug difficult reproduce depend memory allocation run e.g. dereferencing dangling pointer following typical causes segmentation fault turn often caused programming errors result invalid memory access c code segmentation faults often occur errors pointer use particularly c dynamic memory allocation dereferencing null pointer always result segmentation fault wild pointers dangling pointers point memory may may exist may may readable writable thus result transient bugs example dereferencing variables could cause segmentation fault dereferencing null pointer generally cause segfault reading wild pointer may instead result random data segfault reading dangling pointer may result valid data random data overwritten default action segmentation fault bus error abnormal termination process triggered core file may generated aid debugging platform-dependent actions may also performed example linux systems using grsecurity patch may log sigsegv signals order monitor possible intrusion attempts using buffer overflows writing read-only memory raises segmentation fault level code errors occurs program writes part code segment read-only portion data segment loaded os read-only memory example ansi c code generally cause segmentation fault platforms memory protection attempts modify string literal undefined behavior according ansi c standard compilers catch compile time instead compile executable code crash program containing code compiled string hello world placed rodata section program executable file read-only section data segment loaded operating system places strings constant data read-only segment memory executed variable set point string location attempt made write h character variable memory causing segmentation fault compiling program compiler check assignment read-only locations compile time running unix-like operating system produces following runtime error backtrace core file gdb code corrected using array instead character pointer allocates memory stack initializes value string literal even though string literals modified undefined behavior c standard c codice_1 type implicit conversion original code points codice_2 array c++ codice_3 type thus implicit conversion compilers generally catch particular error c c-like languages null pointers used mean pointer object error indicator dereferencing null pointer read write null pointer common program error c standard say null pointer pointer memory address 0 though may case practice operating systems map null pointer address accessing causes segmentation fault behavior guaranteed c standard dereferencing null pointer undefined behavior c conforming implementation allowed assume pointer dereferenced null sample code creates null pointer tries access value read value causes segmentation fault runtime many operating systems dereferencing null pointer assigning writing value non-existent target also usually causes segmentation fault following code includes null pointer dereference compiled often result segmentation fault value unused thus dereference often optimized away dead code elimination another example recursion without base case causes stack overflow results segmentation fault infinite recursion may necessarily result stack overflow depending language optimizations performed compiler exact structure code case behavior unreachable code return statement undefined compiler eliminate use tail call optimization might result stack usage optimizations could include translating recursion iteration given structure example function would result program running forever probably overflowing stack
[ 2560, 2571, 6155, 6675, 7187, 10776, 25, 4637, 3615, 9762, 4643, 6180, 5158, 7728, 7217, 10803, 9784, 10809, 576, 2625, 2627, 8773, 6221, 3157, 3160, 3675, 2653, 97, 11363, 6760, 10856, 8298, 9835, 5744, 7795, 7285, 4727, 2168, 9335, 634,...
None
10,334
5
Lightweight_Access_Point_Protocol:lightweight access point protocol lightweight access point protocol lwapp name protocol control multiple wi-fi wireless access points reduce amount time spent configuring monitoring troubleshooting large network system also allow network administrators closely analyze network system installed central server gathers data rf devices different brands settings server command selected group devices apply given settings simultaneously lwapp proposed airespace standard protocol provide interoperability among brand access point airespace purchased cisco systems purpose standardize lightweight access points internet engineering task force ietf approved standard sponsored cisco systems submitted ietf rfc 5412 although protocol far popular beyond airespace/cisco product lines capwap standard based lwapp support lwapp also found analysis products airmagnet implemented software based protocol analyze cisco wireless products still considered proprietary lwapp systems compete non-standard lightweight wireless mechanisms companies like meru networks aruba networks layer 2 lwapp requires data link connection order transfer frames layer 2 broadcasts even ip connectivity established still operate layer 2 layer 4 udp 12222 data channel 12223 control channel connectivity must established work form protocol broadcasts dhcp option 43 used prime access-points network controller must subnet dhcp configured handle layer 3 lwapp provisioning another option directing ap controller defining controller dns server network
[ 6993 ]
None
10,335
9
BANCStar_programming_language:bancstar programming language bancstar specialist computer programming language financial applications language internal language national financial computer services inc later broadway seymour bancstar application software automate operations bank branch language fixed format four integer command language nfcs internally referred screen code resembles esoteric programming language much sometimes mistaken joke language conceptually bancstar application executed screen code much like primitive virtual machine 5.1c release legal characters numerals 0–9 comma minus sign carriage return however used real commercial applications originally intended generated code user interface-building tool — similar bytecode rendered ascii — due limitations tool became directly programmed language bancstar 10.0 release changed screen code format binary rearranged numeric codes opcode variable number parameter integers 10.0 opcode encoded bit mapped length value indicated length command words
[ 7395, 8262 ]
Test
10,336
2
IPhone_11:iphone 11 iphone 11 series upcoming smartphones designed developed marketed apple rumoured released september 10 2019 steve jobs theater apple park cupertino apple ceo tim cook may go sale september 21 2019 phone unique among iphones details regarding phone widely leaked august 2019 weeks phone release thirteenth-generation flagships iphone successors iphone xs xr phone criticized due small improvements predecessors mainly camera quality reported phone also keep notch design featured iphone x
[ 2979, 9732 ]
Test
10,337
3
ATX:atx atx advanced technology extended motherboard power supply configuration specification developed intel 1995 improve previous de facto standards like design first major change desktop computer enclosure motherboard power supply design many years improving standardization interchangeability parts specification defines key mechanical dimensions mounting point i/o panel power connector interfaces computer case motherboard power supply atx common motherboard design standards smaller boards including microatx flexatx nano-itx mini-itx usually keep basic rear layout reduce size board number expansion slots dimensions full-size atx board allows many atx chassis also accept microatx boards official atx specifications released intel 1995 revised numerous times since recent atx motherboard specification version 2.2 recent atx12v power supply unit specification 2.4 released april 2013 eatx extended atx bigger version atx motherboard 12 x 13 inch dimensions advantages eatx motherboard dual socket support 2004 intel announced btx balanced technology extended standard intended replacement atx atx design still remains popular btx introduced manufacturers back computer case major changes made standard originally style cases keyboard connector expansion slots add-on card backplates onboard interfaces serial parallel ports connected via flying leads connectors mounted either spaces provided case brackets placed unused expansion slot positions atx allowed motherboard manufacturer put ports rectangular area back system arrangement could define though number general patterns depending ports motherboard offers followed manufacturers cases usually fitted snap-out panel also known i/o plate i/o shield one common arrangements necessary i/o plates replaced suit motherboard fitted i/o plates usually included motherboards designed particular computer computer operate correctly without plate fitted although open gaps case may compromise emi/rfi screening allow ingress dirt random foreign bodies panels made allowed fitting motherboard atx case atx motherboards come integrated i/o plate atx also made ps/2-style mini-din keyboard mouse connectors ubiquitous systems used 5-pin din connector keyboard generally used serial port mice although ps/2 mouse ports also found systems many modern motherboards phasing ps/2-style keyboard mouse connectors favor modern universal serial bus legacy connectors slowly phased modern atx motherboards include 25-pin parallel ports 9-pin rs-232 serial ports place onboard peripheral ports ethernet firewire esata audio ports analog s/pdif video analog d-sub dvi hdmi displayport extra usb ports wi-fi several atx-derived designs specified use power supply mountings basic back panel arrangement set different standards size board number expansion slots standard atx provides seven slots spacing popular microatx size removes three slots leaving four width refers distance along external connector edge depth front rear note larger size inherits previous smaller colors area note aopen conflated term mini atx recent design since references mini atx removed atx specifications since adoption microatx aopen definition contemporary term one listed apparently historical significance number manufacturers added one two three additional expansion slots standard 0.8 inch spacing standard 12-inch atx motherboard width form factors considered obsolete 1999 included baby-at full size semi-proprietary lpx low-profile cases proprietary motherboard designs compaq packard-bell hewlett packard others existed interchangeable multi-manufacturer boards cases portable notebook computers custom motherboards unique particular products although true e-atx motherboard manufacturers also refer motherboards measurements e-atx e-atx ssi eeb server system infrastructure ssi forum enterprise electronics bay eeb share dimensions screw holes two standards align rendering incompatible 2008 foxconn unveiled foxconn f1 motherboard prototype width standard atx motherboard extended 14.4 length accommodate 10 slots firm called new design motherboard ultra atx ces 2008 showing also unveiled january 2008 ces lian li armorsuit pc-p80 case 10 slots designed motherboard name xl-atx used least three companies different ways september 2009 evga corporation already released xl-atx motherboard evga x58 classified 4-way sli gigabyte technology launched another xl-atx motherboard model number ga-x58a-ud9 2010 measuring ga-x79-ud7 2011 measuring april 2010 gigabyte announced ga-890fxa-ud7 motherboard allowed seven slots moved downward one slot position added length could allowed placement eight expansion slots top slot position vacant particular model msi released msi x58 big bang 2010 msi p67 big bang marshal 2011 msi x79 xpower big bang 2 2012 msi z87 xpower 2013 although boards room additional expansion slots 9 8 total respectively three provide seven expansion connectors topmost positions left vacant provide room cpu chipset associated cooling 2010 evga corporation released new motherboard super record 2 sr-2 whose size surpasses evga x58 classified 4-way sli new board designed accommodate two dual qpi lga1366 socket cpus e.g intel xeon similar intel skulltrail motherboard could accommodate two intel core 2 quad processors total seven pci-e slots 12 ddr3 ram slots new design dubbed hptx atx specification requires power supply produce three main outputs +3.3 v +5 v +12 v. low-power −12 v +5 v standby supplies also required −12 v supply primarily used provide negative supply voltage rs-232 ports also used one pin conventional pci slots primarily provide reference voltage models sound cards 5 v supply used produce trickle power provide soft-power feature atx pc turned well powering real-time clock conserve charge cmos battery −5 v output originally required supplied isa bus removed later versions atx standard became obsolete removal isa bus expansion slots isa bus still found computer compatible old ibm pc specification e.g. found playstation 4 originally motherboard powered one 20-pin connector atx power supply provides number peripheral power connectors modern systems two connectors motherboard 8-pin 4+4-pin auxiliary connector providing additional power cpu main 24-pin power supply connector extension original 20-pin version 20-pin molex 39-29-9202 motherboard 20-pin molex 39-01-2200 cable connector pin pitch 4.2 mm one sixth inch four wires special functions generally supply voltages must within ±5 nominal values times little-used negative supply voltages however ±10 tolerance specification ripple 10 hz–20 mhz bandwidth 20–24-pin molex mini-fit jr. power rating 600 volts 8 amperes maximum per pin using 18 awg wire large server motherboards 3d graphics cards required progressively power operate necessary revise extend standard beyond original 20-pin connector allow current using multiple additional pins parallel low circuit voltage restriction power flow connector pin maximum rated voltage single mini-fit jr pin would capable 4800 watts atx power supplies generally dimensions width height preceding lpx low profile extension form factor often incorrectly referred power supplies due ubiquitous use later baby systems even though actual power supply form factor physically larger share common mounting layout four screws arranged back side unit last dimension 140 mm depth frequently varied depths 160 180 200 230 mm used accommodate higher power larger fan and/or modular connectors original cases flat case style integrated power switch protruded power supply sits flush hole chassis utilizes paddle-style dpst switch similar pc pc-xt style power supplies later so-called baby lpx style computer cases power button directly connected system computer power supply psu general configuration double-pole latching mains voltage switch four pins connected wires four-core cable wires either soldered power button making difficult replace power supply failed blade receptacles used atx power supply typically controlled electronic switch connected power button computer case allows computer turned operating system addition many atx power supplies equivalent-function manual switch back also ensures power sent components switch power supply turned however computer turned front power button power supply connection motherboard changed older lpx standards lpx two similar connectors could accidentally interchanged forcing different keyed connectors place usually causing short-circuits irreversible damage motherboard rule thumb safe operation connect side-by-side connectors black wires together atx uses one large keyed connector connected incorrectly new connector also provides 3.3 volt source removing need motherboards derive voltage 5 v rail motherboards particularly manufactured introduction atx lpx equipment still use support lpx atx psus using atx psu purposes powering atx motherboard power fully turned always partly operate wake-up devices shorting power-on pin atx connector pin 16 green wire black wire ground power button atx system minimum load one voltages may required varies model vendor standard specify operation without minimum load conforming psu may shut output incorrect voltages otherwise malfunction hazardous damaged atx power supply replacement current-limited bench laboratory dc power supply instead better described bulk dc power supply original atx specification called power supply located near cpu power supply fan drawing cooling air outside chassis directing onto processor thought configuration cooling processor would achievable without need active heatsink recommendation removed later specifications modern atx power supplies usually exhaust air case atx introduced late 1995 defined three types power connectors power distribution specification defined psu power provided 5 v 3.3 v rails electronic components cpu ram chipset pci agp isa cards used 5 v 3.3 v power supply 12 v rail used computer fans motors peripheral devices hdd fdd cd-rom etc designing pentium 4 platform 1999/2000 standard 20-pin atx power connector found insufficient meet increasing power-line requirements standard significantly revised atx12v 1.0 atx12v 1.x sometimes inaccurately called atx-p4 atx12v 1.x also adopted amd athlon xp athlon 64 systems however early model athlon xp mp boards including server boards later model lower-end motherboards 4-pin connector described numbering atx revisions may little confusing atx refers design goes version 2.2 2004 24 pins atx12v 2.0 atx12v describes psu instance atx 2.03 pretty commonly seen psu 2000 2001 often include p4 12v connector even norm define yet main changes additions atx12v 1.0 released february 2000 formally called +12 v power connector commonly referred p4 connector first needed support pentium 4 processor pentium 4 processors generally powered 5 v rail later processors operate much lower voltages typically around 1 v draw 100 infeasible provide power low voltages high currents standard system power supply pentium 4 established practice generating dc-to-dc converter motherboard next processor powered 4-pin 12 v connector minor revision august 2000 power 3.3 v rail slightly increased smaller changes made relatively minor revision january 2002 significant change −5 v rail longer required became optional voltage required isa bus longer present almost modern computers introduced april 2003 month 2.0 standard introduced changes mostly minor atx12v 2.x brought significant design change regarding power distribution analyzing power demands then-current pcs determined would much cheaper practical power pc components 12 v rails instead 3.3 v 5 v rails particular pci express expansion cards take much power 12 v rail 5.5 older agp graphics cards took 1 12 v 6 3.3 v. cpu also driven 12 v rail done 5 v rail older pcs pentium 4 power demands pci express incorporated atx12v 2.0 introduced february 2003 defined quite different power distribution atx12v 1.x minor revision june 2004 errant reference −5 v rail removed minor changes introduced minor revision march 2005 power slightly increased rails efficiency requirements changed also released march 2005 includes corrections specifies high current series wire terminals 24-pin atx motherboard 4-pin +12 v power connectors effective march 2007 recommended efficiency increased 80 least 70 required 12 v minimum load requirement lowered higher efficiency generally results less power consumption less waste heat 80 recommendation brings supplies line new energy star 4.0 mandates reduced load requirement allows compatibility processors draw little power startup absolute over-current limit 240 va per rail removed allowing 12 v lines provide 20 per rail revision became effective february 2008 added maximum allowed ripple/noise specification 400 millivolts pwr_on pwr_ok signals requires dc power must hold 1 millisecond pwr_ok signal drops clarified country-specific input line harmonic content electromagnetic compatibility requirements added section climate savers updated recommended power supply configuration charts updated cross-regulation graphs unofficial name given later revisions v2.31 spec current version atx12v spec published april 2013 specified revision 1.31 'design guide desktop platform form factors names atx12v version 2.4 sfx merely design small form factor sff power supply casing power specifications almost identical atx thus sfx power supply mostly pin-compatible atx power supply main difference reduced dimensions electrical difference sfx specifications require −5 v rail since −5 v required isa-bus expansion cards issue modern hardware decreases productions costs result atx pin 20 carried −5 v absent current power supplies optional atx atx12v version 1.2 deleted atx version 1.3 sfx dimensions 125 × 63.5 × 100 mm width × height × depth 60 mm fan compared standard atx dimensions 150 × 86 × 140 mm optional 80 40 mm fan replacement increases decreases height sfx unit manufacturers retailers incorrectly market sfx power supplies µatx microatx power supplies besides manufacturers make sfx-l dimensions 125 × 63.5 × 130 mm accommodate 120 mm fan thin form factor another small power supply design standard atx specification connectors generally dimensioned w × h × 85 × 64 × 175 mm 3.34 × 2.52 × 6.89 provides wtx style motherboard connector incompatible standard atx motherboard connector atx12v power supply derivative made amd power athlon mp dual processor platform used high-end athlon mp motherboards special 8-pin supplemental connector motherboard amd ges psu required motherboards motherboards work atx 12 v psus a. atx12v-ges 24-pin p1 motherboard connector pinout motherboard connector follows viewing motherboard b. atx12v-ges 8-pin p2 motherboard connector pinout motherboard connector follows viewing motherboard eps12v defined server system infrastructure ssi used primarily smp/multi-core systems core 2 core i7 opteron xeon 24-pin atx motherboard connector atx12v v2.x 8-pin secondary connector optional 4-pin tertiary connector rather include extra cable many power supply makers implement 8-pin connector two combinable 4-pin connectors ensure backwards compatibility atx12v motherboards high-performance video card power demands dramatically increased 2000s high-end graphics cards power demands exceed agp pcie slot capabilities cards supplementary power delivered standard 4-pin peripheral floppy power connector midrange high-end pcie graphics cards manufactured 2004 typically use standard 6 8-pin pcie power connector directly psu although atx power supply specifications mostly vertically compatible ways electrically physically potential issues mixing old motherboards/systems new psus vice versa main issues consider following practical guidance mix mix proprietary brand-name systems require matching proprietary power supply may also support standard interchangeable power supplies efficiency power supplies means extent power wasted converting electricity household supply regulated dc computer power supplies vary around 70 90 efficiency various initiatives exist improve efficiency computer power supplies climate savers computing initiative promotes energy saving reduction greenhouse gas emissions encouraging development use efficient power supplies 80 plus certifies variety efficiency levels power supplies encourages use via financial incentives efficient power supplies also save money wasting less power result use less electricity power computer emit less waste heat results significant energy savings central air conditioning summer gains using efficient power supply substantial computers use lot power although power supply larger needed power rating extra margin safety overloading unit often less efficient wastes electricity lower loads appropriately sized unit example 900-watt power supply 80 plus silver efficiency rating means power supply designed least 85-percent efficient loads 180 w may 73 efficient load lower 100 w typical idle power desktop computer thus 100 w load losses supply would 37 w power supply put 450 w load supply efficiency peaks 89 loss would 56 w despite supplying 4.5 times useful power comparison 500-watt power supply carrying 80 plus bronze efficiency rating means power supply designed least 82-percent efficient loads 100 w may provide 84-percent efficiency 100 w load wasting 19 w
[ 1400, 780, 8730, 1309, 799, 3883, 4270, 7983, 8625, 6322, 8627, 2500, 455, 7113, 9307, 10715, 3037, 9057, 11623, 8301, 7151, 10095, 2161, 6129, 2803, 5368 ]
Test
10,338
2
Criticism_of_Microsoft_Windows:criticism microsoft windows various versions microsoft desktop operating system windows received many criticisms since microsoft inception 2010 google engineer tavis ormandy criticized microsoft taking long patch fix reported security vulnerability windows virtual dos machine vdm patched 7 months mr. ormandy reported microsoft 2004 marc maiffret chief hacking officer security research firm eeye digital security criticized microsoft providing security patch windows asn.1 implementation 200 days right release windows vista computer scientist peter gutmann criticised digital rights management drm included microsoft windows allow content providers place restrictions certain types multimedia playback collected criticism write-up released stated analysis drew responses microsoft microsoft states criticized drm features already present windows xp thus new problem customers problematic features would activated required content played responses came george ou zdnet ed bott zdnet ed bott also published three-part rebuttal peter gutmann claims details number factual errors analysis criticizes gutmann reliance questionable sources personal blog postings friends anecdotal evidence google searches analysis paper gutmann never tested theories windows 7 allegations also made draconian drm spurred debate criticism website slashdot claims overreaching vista drm independent tech writers quickly dismissed claims faulty analysis actual problem spurred criticism turned unrelated problem experienced single user tried circumvent adobe creative suite copy protection mechanisms changing files failed work user concluded draconian drm windows windows criticized internet explorer web browser integrated windows shell windows 98 onwards previously internet explorer shipped separate application one problem since explorer easily replaced product another vendor undermines consumer choice issue precipitated concerns microsoft engages monopolistic practices resulted united states v. microsoft corp. court case eventually settled court another issue integration security vulnerabilities internet explorer also create security vulnerabilities windows could allow attacker exploit windows remote code execution january 2009 european commission started investigate microsoft bundling internet explorer windows commission stated microsoft tying internet explorer windows operating system harms competition web browsers undermines product innovation ultimately reduces consumer choice european commission microsoft eventually agreed microsoft would include web browser choice selection screen windows users european economic area means browserchoice.eu google microsoft competitor criticized windows becoming slower less reliable long term use adrian kingsley-hughes writing zdnet believes slow-down time due loading much software loading duplicate software installing much free/trial/beta software using old outdated incorrect drivers installing new drivers without uninstalling old ones may also due malware spyware 1999 andrew fernandez chief scientist cryptonym morrisville north carolina found cryptographic public key stored variable _key second key labeled nsakey discovery lead flurry speculation conspiracy theories second key could owned united states national security agency nsa could allow intelligence agency subvert windows user security also researcher dr. nicko van someren discovered cryptographic keys third key codice_1 file time existed windows 2000 release concerns raised cpus encrypted instruction sets existed time would made impossible discover cryptographic keys microsoft denied allegations — microsoft attributes naming key due technical review nsa pointing backup key required conform regulations evidence name key ever presented key enabled backdoor cryptographer computer security specialist bruce schneier also argued conspiracy theory pointing nsa wanted back door windows microsoft consent would need cryptographic key cryptographic keys included versions windows windows 95 osr2 onwards concerns shown advocates critics windows 10 privacy policies collection use customer data default express settings windows 10 configured send various information microsoft parties including collection user contacts calendar data associated input data personalize speech typing inking input typing inking data improve recognition allow apps use unique advertising id analytics advertising personalization functionality introduced windows 8.1 allow apps request user location data send data microsoft trusted partners improve location detection windows 8 similar settings except location data collection include trusted partners users opt data collection telemetry data error reporting usage also sent microsoft disabled non-enterprise versions windows 10 use cortana intelligent personal assistant also requires collection data device location data calendar apps use data emails text messages call contacts often interact device ” personalize functionality rock paper shotgun writer alec meer argued microsoft intent data collection lacked transparency stating world 45 pages policy documents opt-out settings split across 13 different settings screens external website constitutes 'real transparency extremetech pointed whilst previously campaigning google similar data collection strategies microsoft hoovers data ways would make google jealous however also pointed requirement vast usage customer data become norm citing increased reliance cloud computing forms external processing well similar data collection requirements services mobile devices google siri august 2015 russian politician nikolai levichev called windows 10 banned use russian government sends user data servers united states federal law requiring online services store data russian users servers within country blocked taken effect september 2016 following release 10 allegations also surfaced microsoft backported operating system increased data collection windows 7 windows 8 via recommended patches added additional telemetry features updates addition diagnostics tracking service connected specifically microsoft existing customer experience improvement program opt-in program sends additional diagnostic information microsoft addressing issues application insights service third-party software data collection functionality capable transmitting personal information browsing history contents emails chat video calls voice mail photos documents personal files keystrokes microsoft analysis accordance end user license agreement terms services agreement microsoft updated state following
[ 6150, 11283, 3605, 5666, 11301, 6697, 1581, 7215, 5682, 8757, 582, 1098, 9812, 8798, 4704, 4194, 10338, 8296, 617, 5225, 107, 8299, 7796, 6265, 8315, 636, 639, 641, 651, 6797, 10896, 2196, 10900, 3224, 10392, 7838, 6827, 3250, 9910, 7359,...
None
10,339
3
Xak:_The_Art_of_Visual_Stage:xak art visual stage xak art visual stage features typical high fantasy setting according game world legends great war fought benevolent weakening ancient gods demon race led collapse eventual mortality gods 'war sealing gods divided world three parts xak world humans oceanity world faeries xexis world demons demon world xexis tightly sealed two worlds prevent reentry warmongering demon race demons left behind xak however others managed discover separate means enter xak xexis anyway ancient history displayed introduction one badu powerful demon able use coercive magic make humans bidding duel god war managed defeat badu seal away mountain ice 250 years god later settled village known fearless live rest mortal life beginning game badu prison broken demons overrun parts xak order stop ravaging lands king wavis sends messenger faerie dork kart famous warrior living village fearless dork however gone missing player takes role latok kart dork 16-year-old son meets messenger faerie pixie latok embarks king quest slay badu hoping find father along way travels latok guided duel spirit course game turns dork thus latok descendant duel latok playable character game notable non-player characters latok meets include initial versions xak art visual stage released nec pc-8801 pc-9801 systems june 1989 followed graphically distinct releases msx2 november 1989 sharp x68000 april 1990 1992 game released pc engine along sequel one-disc compilation xak ii ported riot game features animated cut scenes requires super system card update played pc engine original cd-rom add-on another console port published sunsoft super famicom february 1993 latest visually enhanced remake developed japanese mobile phones became available vodafone live june 1 2004 game first release bandai rpg empire line role-playing games 2001–2008 pc-8801 msx2 x68000 pc-9801 versions art visual stage made downloadable microsoft windows d4 enterprise project egg online service first official english translation game also released dutch msx games distributor woomb.net early 2007 although website shut 2008 content transferred english counterpart project egg musical score xak art visual stage composed ryuji sasai tadahiro nitta marking first collaboration two musicians game soundtrack comprises 42 tracks released may 5 1989 title sounds xak art visual stage 2007 2008 music game pc-8801 msx2 x68000 versions added catalog d4 enterprise video game music service egg music site offers psg fm variation msx2 tracks use fm sound source extensive music x68000 game praised storyline music xak art visual stage referred micro cabin breakthrough title website famitsū magazine described game ’ story magnificent jayson napolitano original sound version stated music great stuff fans distinct sound late 80s audio art visual stage regarded higher quality games time also noted use visual representation system gave impression depth three-dimensionality
[ 8355, 10534, 6797, 9006, 145, 10931, 4181, 6011 ]
None
10,340
1
Oracle_Database:oracle database oracle database commonly referred oracle rdbms simply oracle proprietary multi-model database management system produced marketed oracle corporation database commonly used running online transaction processing oltp data warehousing dw mixed oltp dw database workloads latest generation oracle database 19c available on-prem on-cloud hybrid-cloud environment 19c may also deployed oracle engineered systems e.g exadata on-prem oracle public cloud private cloud customer openworld 2017 san francisco executive chairman board cto larry ellison announced next database generation oracle autonomous database larry ellison two friends former co-workers bob miner ed oates started consultancy called software development laboratories sdl 1977 sdl developed original version oracle software name oracle comes code-name cia-funded project ellison worked formerly employed ampex oracle products follow custom release-numbering -naming convention c current release oracle database 19c stands cloud previous releases e.g oracle database 10g oracle9i database used suffixes g stand grid internet respectively prior release oracle8i database suffixes featured oracle database naming conventions note v1 oracle database larry ellison knew one would want buy version 1 oracle rdbms release numbering used following codes oracle database administrators guide includes brief history key innovations introduced major release oracle database oracle corporation releases critical patch updates cpus security patch updates spus security alerts close security holes could used data theft critical patch updates cpus security alerts come quarterly tuesday closest 17th day month oracle database may licensed deployed on-premises choice platforms including oracle engineered systems on-cloud choice services running general purpose hardware exadata various editions cloud services provide different levels database functionality different use cases e.g dev/test departmental non-critical apps mission-critical workloads different levels performance availability etc service levels oracle corporation provides range database cloud services oracle cloud platform designed different database use cases test/dev deployments small medium sized workloads large mission-critical workloads oracle database cloud services available choice general purpose hardware exadata engineered systems either virtual machines environments 'bare metal infrastructure known oracle cloud infrastructure latest oracle database version 12.2.0.1 comes three editions on-premises deployments oracle corporation also makes following edition available including oracle database 12c release 12.1.0.1 oracle also offered following oracle corporation discontinued se se1 12.1.0.2 release stopped offering new licenses editions december 1 2015 oracle database 12 c supported following os architecture combinations 2008 oracle corporation announced availability oracle exadata database machine v1 first generation engineered systems specifically designed oracle database workloads 2011 oracle corporation announced availability oracle database appliance pre-built pre-tuned highly available clustered database server built using two sunfire x86 servers direct attached storage oracle enterprise edition databases running certain oracle-supplied hardware use hybrid columnar compression efficient storage oracle database offers wide range options features areas availability scalability analytics performance security management developers integration aim enhance complement existing database functionality meet customer-specific requirements database options available enterprise edition offered extra cost exception two rules oracle real application clusters option comes included oracle database 12 c standard edition 2 additional cost availability scalability analytics performance security management developers integration apart clearly defined database options oracle databases may include many semi-autonomous software sub-systems oracle corporation sometimes refers features sense subtly different normal use word example oracle data guard counts officially feature command-stack within sql*plus though usability feature appear list features oracle list features may include example oracle database provides long list supported data models used managed inside oracle database oracle corporation classifies utilities bundled software supporting data transfer data maintenance database administration utilities included oracle database distributions include oracle corporation started drive toward wizard -driven environments view enabling non-programmers produce simple data-driven applications popular application development tool ships oracle database oracle application express apex browser-based tool allows developers build responsive database-driven applications leveraging sql pl/sql skills oracle sql developer free graphical tool database development allows developers browse database objects run sql statements sql scripts edit debug pl/sql statements incorporates standard customized reporting oracle rest data services ords function java ee-based alternative oracle http server providing rest-based interface relational data users also develop applications java pl/sql optionally using tools database upgrade assistant dbua provides gui upgrading oracle database jaccelerator ncomp – native-compilation java accelerator integrates hardware-optimized java code oracle 10g database oracle opatch provides patch management oracle databases sqltxplain tool sqlt offers tuning assistance oracle sql queries oracle database accessed many programming languages environments include java based languages like scala use jdbc access oracle database pl/sql routines within oracle databases access external routines registered operating-system shared libraries dbms_scheduler package invoke external scripts operating-system level pl/sql users oracle support contracts use oracle oracle support mos web site – known metalink re-branding exercise completed october 2010 support site provides users oracle corporation products repository reported problems diagnostic scripts solutions also integrates provision support tools patches upgrades remote diagnostic agent rda operate command-line diagnostic tool executing script data captured provides overview oracle database environment intended diagnostic trouble-shooting within rda hcve health check validation engine verify isolate host system environmental issues may affect performance oracle software oracle corporation also endorses certain practices conventions enhancing use database products include oracle certification program professional certification program includes administration oracle databases one main certification paths contains three levels large number user groups oracle database administrators developers users established geographical/region industry product basis including oracle user group communities also host regular events customers/users share experiences knowledge 2016 oracle holds 1 rdbms market share worldwide based revenue share ahead four closest competitors – microsoft ibm sap teradata market relational databases oracle database competes commercial products ibm db2 udb microsoft sql server oracle ibm tend battle mid-range database market unix linux platforms microsoft dominates mid-range database market microsoft windows platforms however since share many customers oracle ibm tend support products many middleware application categories example websphere peoplesoft siebel systems crm ibm hardware divisions work closely oracle performance-optimizing server-technologies example linux z systems niche commercial competitors include teradata data warehousing business intelligence software ag adabas sybase ibm informix among many others increasingly oracle database products compete open-source software relational database systems postgresql mongodb couchbase oracle acquired innobase supplier innodb codebase mysql part compete better open source alternatives acquired sun microsystems owner mysql 2010 database products licensed open source legal terms open source definition free distribute free royalty licensing fees oracle database system—identified alphanumeric system identifier sid—comprises least one instance application along data storage instance—identified persistently instantiation number activation id sys.v_ database.activation —comprises set operating-system processes memory-structures interact storage typical processes include pmon process monitor smon system monitor oracle documentation refer active database instance shared memory realm users oracle databases refer server-side memory-structure sga system global area sga typically holds cache information data-buffers sql commands user information addition storage database consists online redo logs logs hold transactional history processes turn archive online redo logs archive logs offline redo logs provide basis data recovery physical-standby forms data replication using oracle data guard oracle rac real application clusters option uses multiple instances attached central storage array version 10 g grid computing introduced shared resources instance use cpu resources another node grid advantage oracle rac resources nodes used database node uses memory cpu information shared nodes interconnect—the virtual private network oracle dbms store execute stored procedures functions within pl/sql oracle corporation proprietary procedural extension sql object-oriented language java invoke code objects and/or provide programming structures writing oracle rdbms stores data logically form tablespaces physically form data files datafiles tablespaces contain various types memory segments data segments index segments etc segments turn comprise one extents extents comprise groups contiguous data blocks data blocks form basic units data storage dba impose maximum quotas storage per user within tablespace partitioning feature introduced oracle 8 allows partitioning tables based different set keys specific partitions added dropped help manage large data sets oracle database management tracks computer data storage help information stored codice_1 tablespace codice_1 tablespace contains data dictionary indexes clusters data dictionary consists special collection tables contains information user-objects database since version 8 oracle rdbms also supports locally managed tablespaces store space management information bitmaps headers rather codice_1 tablespace happens default dictionary-managed tablespaces version 10 g later introduced codice_4 tablespace contains tables formerly stored codice_1 tablespace along objects tools oem previously required tablespace disk files primarily represent one following structures physical level data files comprise one data blocks block size vary data files data files occupy pre-allocated space file system computer server use raw disk directly exist within asm logical volumes oracle database installations come default schema called codice_6 installation process sets sample tables user logs database username codice_7 password codice_8 name codice_6 schema originated bruce scott one first employees oracle software development laboratories cat named tiger oracle corporation de-emphasizes codice_6 schema uses features recent oracle releases examples supplied oracle corporation reference default hr oe schemas default schemas include oracle instance uses system global area sga—a shared-memory area—to store data control-information oracle instance allocates sga starts de-allocates shut-down time information sga consists following elements fixed size established instance startup every oracle database one physical datafiles contain database data data logical database structures tables indexes physically stored datafiles allocated database datafiles following characteristics data datafile read needed normal database operation stored memory cache oracle database example user wants access data table database requested information already memory cache database read appropriate datafiles stored memory modified new data necessarily written datafile immediately reduce amount disk access increase performance data pooled memory written appropriate datafiles start instance using enterprise manager sql*plus amount memory allocated sga displayed. link library cache stores shared sql caching parse tree execution plan every unique sql statement multiple applications issue sql statement application access shared sql area reduces amount memory needed reduces processing-time used parsing execution planning data dictionary comprises set tables views map structure database oracle databases store information logical physical structure database data dictionary contains information oracle instance frequently accesses data dictionary parse sql statements oracle operation depends ready access data dictionary—performance bottlenecks data dictionary affect oracle users database administrators must make sure data dictionary cache sufficient capacity cache data without enough memory data-dictionary cache users see severe performance degradation allocating sufficient memory shared pool data dictionary cache resides precludes particular performance problem program global area pga memory-area oracle instance contains data control-information oracle server-processes background process every server background process pga total pga elements called instance pga size content pga depends oracle-server options installed area consists following components dbas monitor pga usage via system view dynamic performance views also known fixed views within oracle database present information virtual tables x tables built basis database memory database users access v views named prefix synonyms obtain information database structures performance oracle rdbms typically relies group processes running simultaneously background interacting monitor expedite database operations typical operating environments might include – temporarily permanently – following individual processes shown along abbreviated nomenclature oracle database terminology distinguishes different computer-science terms describing end-users interact database session within instance session identifier – session id sid distinct oracle system-identifier sid may also associated spid operating-system process identifier oracle databases control simultaneous access data resources locks alternatively documented enqueues databases also use latches – low-level serialization mechanisms protect shared data structures system global area oracle locks fall three categories note course multiple releases oracle reduced number instances exclusive ddl lock required making changes schema objects non-blocking ddl added 11.2 non-blocking ddl added list 12.1 non-blocking ddl added list 12.2 non-blocking ddl added list 18.1 database administrators control many tunable variations oracle instance means values parameter file file ascii default form pfile normally name format codice_21 default binary equivalent server parameter file spfile dynamically reconfigurable extent defaults format codice_22 within sql-based environment views codice_23 codice_24 give access reading parameter values implementation oracle dbms kernel code depends c programming database administrators limited access oracle-internal c structures via v views underlying x tables layers modules kernel depending different releases may include following given inferred meaning scheduler dbms_scheduler package available oracle 10g onwards job subsystems dbms_job package permit automation predictable processing oracle resource manager aims allocate cpu resources users groups users resources become scarce oracle release 10.2 database resource manager operates enterprise edition oracle corporation stated product announcements manageability dbas improved oracle9i 10g lungu vătuiu 2008 assessed relative manageability performing common dba tasks measuring timings performed tests single pentium cpu 1.7 ghz 512 mb ram running windows server 2000 oracle9i 10g installation improved 36 day-to-day administration 63 backup recovery 63 performance diagnostics tuning 74 weighted total improvement 56 researchers concluded oracle10g represents giant step forward oracle9i making database easier use manage various file-system structures hold logs trace files record different aspects database activity configurable destinations records include oracle net services allow client remote applications access oracle databases via network sessions using various protocols oracle database software comes 63 language-versions including regional variations british english american english variations versions cover names days months abbreviations time-symbols a.m. a.d. sorting oracle corporation translated oracle database error-messages arabic catalan chinese czech danish dutch english finnish french german greek hebrew hungarian italian japanese korean norwegian polish portuguese romanian russian slovak spanish swedish thai turkish oracle corporation provides database developers tools mechanisms producing internationalized database applications referred internally globalization
[ 3, 1539, 8201, 1035, 1037, 1549, 10258, 2068, 1049, 5658, 9245, 3103, 9762, 5669, 2089, 10793, 5677, 10286, 9263, 7218, 3636, 9782, 10297, 1594, 5691, 10302, 9286, 6219, 10835, 597, 10326, 7767, 5210, 2652, 96, 7776, 3171, 9828, 2669, 574...
Test
10,341
5
Secure_Shell:secure shell secure shell ssh cryptographic network protocol operating network services securely unsecured network typical applications include remote command-line login remote command execution network service secured ssh ssh provides secure channel unsecured network client–server architecture connecting ssh client application ssh server protocol specification distinguishes two major versions referred ssh-1 ssh-2 standard tcp port ssh 22 ssh generally used access unix-like operating systems also used microsoft windows windows 10 uses openssh default ssh client ssh designed replacement telnet unsecured remote shell protocols berkeley rlogin rsh rexec protocols protocols send information notably passwords plaintext rendering susceptible interception disclosure using packet analysis encryption used ssh intended provide confidentiality integrity data unsecured network internet although files leaked edward snowden indicate national security agency sometimes decrypt ssh allowing read contents ssh sessions ssh uses public-key cryptography authenticate remote computer allow authenticate user necessary several ways use ssh one use automatically generated public-private key pairs simply encrypt network connection use password authentication log another use manually generated public-private key pair perform authentication allowing users programs log without specify password scenario anyone produce matching pair different keys public private public key placed computers must allow access owner matching private key owner keeps private key secret authentication based private key key never transferred network authentication ssh verifies whether person offering public key also owns matching private key versions ssh important verify unknown public keys i.e associate public keys identities accepting valid accepting attacker public key without validation authorize unauthorized attacker valid user unix-like systems list authorized public keys typically stored home directory user allowed log remotely file ~/.ssh/authorized_keys file respected ssh writable anything apart owner root public key present remote end matching private key present local end typing password longer required software like message passing interface mpi stack may need password-less access run properly however additional security private key locked passphrase private key also looked standard places full path specified command line setting option -i ssh ssh-keygen utility produces public private keys always pairs ssh also supports password-based authentication encrypted automatically generated keys case attacker could imitate legitimate server side ask password obtain man-in-the-middle attack however possible two sides never authenticated ssh remembers key server side previously used ssh client raises warning accepting key new previously unknown server password authentication disabled ssh typically used log remote machine execute commands also supports tunneling forwarding tcp ports x11 connections transfer files using associated ssh file transfer sftp secure copy scp protocols ssh uses client-server model standard tcp port 22 assigned contacting ssh servers ssh client program typically used establishing connections ssh daemon accepting remote connections commonly present modern operating systems including macos distributions linux openbsd freebsd netbsd solaris openvms notably versions windows prior 1709 include ssh default proprietary freeware open source e.g putty version openssh part cygwin versions various levels complexity completeness exist file managers unix-like systems e.g konqueror use fish protocol provide split-pane gui drag-and-drop open source windows program winscp provides similar file management synchronization copy remote delete capability using putty back-end winscp putty available packaged run directly usb drive without requiring installation client machine setting ssh server windows typically involves enabling feature settings app windows 10 version 1709 official win32 port openssh available ssh important cloud computing solve connectivity problems avoiding security issues exposing cloud-based virtual machine directly internet ssh tunnel provide secure path internet firewall virtual machine 1995 tatu ylönen researcher helsinki university technology finland designed first version protocol called ssh-1 prompted password-sniffing attack university network goal ssh replace earlier rlogin telnet ftp rsh protocols provide strong authentication guarantee confidentiality ylönen released implementation freeware july 1995 tool quickly gained popularity towards end 1995 ssh user base grown 20,000 users fifty countries december 1995 ylönen founded ssh communications security market develop ssh original version ssh software used various pieces free software gnu libgmp later versions released ssh communications security evolved increasingly proprietary software estimated year 2000 number users grown 2 million secsh official internet engineering task force ietf name ietf working group responsible version 2 ssh protocol 2006 revised version protocol ssh-2 adopted standard version incompatible ssh-1 ssh-2 features security feature improvements ssh-1 better security example comes diffie–hellman key exchange strong integrity checking via message authentication codes new features ssh-2 include ability run number shell sessions single ssh connection due ssh-2 superiority popularity ssh-1 implementations libssh v0.8.0+ lsh dropbear support ssh-2 protocol january 2006 well version 2.1 established rfc 4253 specified ssh server supports 2.0 prior versions ssh identify protoversion 1.99 actual version method identify backward compatibility 1999 developers wanting free software version available went back older 1.2.12 release original ssh program last released open source license björn grönvall ossh subsequently developed codebase shortly thereafter openbsd developers forked grönvall code extensive work creating openssh shipped 2.6 release openbsd version portability branch formed port openssh operating systems openssh single popular ssh implementation coming default large number operating systems ossh meanwhile become obsolete openssh continues maintained supports ssh-2 protocol expunged ssh-1 support codebase openssh 7.6 release ssh protocol used many applications across many platforms including unix variants linux bsds including apple macos solaris well microsoft windows applications may require features available compatible specific ssh clients servers example using ssh protocol implement vpn possible presently openssh server client implementation secure shell protocols used several file transfer mechanisms ssh-2 protocol internal architecture defined rfc 4251 well-separated layers namely open architecture provides considerable flexibility allowing use ssh variety purposes beyond secure shell functionality transport layer alone comparable transport layer security tls user-authentication layer highly extensible custom authentication methods connection layer provides ability multiplex many secondary sessions single ssh connection feature comparable beep available tls intended performance enhancements ssh products 1998 vulnerability described ssh 1.5 allowed unauthorized insertion content encrypted ssh stream due insufficient data integrity protection crc-32 used version protocol fix known ssh compensation attack detector introduced implementations many updated implementations contained new integer overflow vulnerability allowed attackers execute arbitrary code privileges ssh daemon typically root january 2001 vulnerability discovered allows attackers modify last block idea-encrypted session month another vulnerability discovered allowed malicious server forward client authentication another server since ssh-1 inherent design flaws make vulnerable generally considered obsolete avoided explicitly disabling fallback ssh-1 modern servers clients support ssh-2 november 2008 theoretical vulnerability discovered versions ssh allowed recovery 32 bits plaintext block ciphertext encrypted using standard default encryption mode cbc straightforward solution use ctr counter mode instead cbc mode since renders ssh resistant attack december 28 2014 der spiegel published classified information leaked whistleblower edward snowden suggests national security agency may able decrypt ssh traffic technical details associated process disclosed analysis 2017 hacking tools bothanspy gyrfalcon suggested ssh protocol compromised following rfc publications ietf secsh working group document ssh-2 proposed internet standard later modified expanded following publications addition openssh project includes several vendor protocol specifications/extensions
[ 513, 2050, 6657, 10242, 517, 1030, 510, 3592, 521, 6154, 9223, 10254, 2064, 3089, 9744, 8211, 7188, 11284, 7702, 3097, 6681, 6682, 10269, 10271, 6689, 9762, 35, 2083, 2085, 9251, 10788, 7208, 3625, 4649, 3629, 7214, 8238, 562, 1586, 2610,...
Test
10,342
1
Microsoft_Query:microsoft query microsoft query visual method creating database queries using examples based text string name document list documents qbe system converts user input formal database query using structured query language sql backend allowing user perform powerful searches without explicitly compose sql without even needing know sql derived moshé m. zloof original query example qbe implemented mid-1970s ibm research centre yorktown new york context microsoft access qbe used introducing students database querying user-friendly database management system small businesses microsoft excel allows results qbe queries embedded spreadsheets
[ 7523, 3556, 10413, 2901, 11030, 3323 ]
Test
10,343
4
Capsa_(software):capsa software capsa name family packet analyzer developed colasoft network administrators monitor troubleshoot analyze wired wireless networks currently three editions available capsa enterprise edition capsa standard edition capsa free edition capsa enterprise edition flagship colasoft capsa packet analyzer family supports ethernet wlan networks performs real-time packet capturing analysis well supporting past-events analysis marketed tool enterprise network administrator help deal daily network work various kinds network problem maintain productive enterprise network capsa standard edition ethernet packet analyzer designed networking professionals small business network administrators marketed network tool network monitoring troubleshooting analyzing purposes capsa free edition freeware ethernet packet analyzer designed colasoft personal use marketed tool network geeks learn protocols packets networking related knowledge free charge personal family users network monitoring troubleshooting needs anyone download capsa free edition colasoft website legal noncommercial use
[ 9440, 10788, 1064, 842, 6797, 7983, 6013 ]
Test
10,344
5
Network_Time_Protocol:network time protocol network time protocol ntp networking protocol clock synchronization computer systems packet-switched variable-latency data networks operation since 1985 ntp one oldest internet protocols current use ntp designed david l. mills university delaware ntp intended synchronize participating computers within milliseconds coordinated universal time utc uses intersection algorithm modified version marzullo algorithm select accurate time servers designed mitigate effects variable network latency ntp usually maintain time within tens milliseconds public internet achieve better one millisecond accuracy local area networks ideal conditions asymmetric routes network congestion cause errors 100 ms protocol usually described terms client-server model easily used peer-to-peer relationships peers consider potential time source implementations send receive timestamps using user datagram protocol udp port number 123 also use broadcasting multicasting clients passively listen time updates initial round-trip calibrating exchange ntp supplies warning impending leap second adjustment information local time zones daylight saving time transmitted current protocol version 4 ntpv4 proposed standard documented backward compatible version 3 specified /small 1979 network time synchronization technology used possibly first public demonstration internet services running trans-atlantic satellite network national computer conference new york technology later described 1981 internet engineering note ien 173 public protocol developed documented technology first deployed local area network part hello routing protocol implemented fuzzball router experimental operating system used network prototyping ran many years related network tools available include daytime time protocols recording time events well icmp timestamp ip timestamp option complete synchronization systems although lacking ntp data analysis clock disciplining algorithms include unix daemon timed uses election algorithm appoint server clients digital time synchronization service dtss uses hierarchy servers similar ntp stratum model 1985 ntp version 0 ntpv0 implemented fuzzball unix ntp packet header round-trip delay offset calculations persisted ntpv4 documented despite relatively slow computers networks available time accuracy better 100 milliseconds usually obtained atlantic spanning links accuracy tens milliseconds ethernet networks 1988 much complete specification ntpv1 protocol associated algorithms published drew experimental results clock filter algorithm documented first version describe client-server peer-to-peer modes 1991 ntpv1 architecture protocol algorithms brought attention wider engineering community publication article david l. mills ieee transactions communications 1989 published defining ntpv2 means state machine pseudocode describe operation introduced management protocol cryptographic authentication scheme survived ntpv4 bulk algorithms era also largely survived ntpv4 1992 defined ntpv3 rfc included analysis sources error reference clock final client enabled calculation metric helps choose best server several candidates appear disagree broadcast mode introduced subsequent years new features added algorithm improvements made became apparent new protocol version required 2010 published containing proposed specification ntpv4 protocol significantly moved since 2014 updated rfc yet published following retirement mills university delaware reference implementation currently maintained open source project led harlan stenn ntp uses hierarchical semi-layered system time sources level hierarchy termed stratum assigned number starting zero reference clock top server synchronized stratum n server runs stratum n 1 number represents distance reference clock used prevent cyclical dependencies hierarchy stratum always indication quality reliability common find stratum 3 time sources higher quality stratum 2 time sources brief description strata 0 1 2 3 provided upper limit stratum 15 stratum 16 used indicate device unsynchronized ntp algorithms computer interact construct bellman-ford shortest-path spanning tree minimize accumulated round-trip delay stratum 1 servers clients addition stratum protocol able identify synchronization source server terms reference identifier refid 64-bit timestamps used ntp consist 32-bit part seconds 32-bit part fractional second giving time scale rolls every 2 seconds 136 years theoretical resolution 2 seconds 233 picoseconds ntp uses epoch january 1 1900 therefore first rollover occurs february 7 2036 ntpv4 introduces 128-bit date format 64 bits second 64 bits fractional-second most-significant 32-bits format era number resolves rollover ambiguity cases according mills 64-bit value fraction enough resolve amount time takes photon pass electron speed light 64-bit second value enough provide unambiguous time representation universe goes dim typical ntp client regularly polls one ntp servers client must compute time offset round-trip delay time offset θ difference absolute time two clocks defined round-trip delay δ values θ δ passed filters subjected statistical analysis outliers discarded estimate time offset derived best three remaining candidates clock frequency adjusted reduce offset gradually creating feedback loop accurate synchronization achieved incoming outgoing routes client server symmetrical nominal delay routes common nominal delay systematic bias exists half difference forward backward travel times ntp reference implementation along protocol continuously developed 20 years backwards compatibility maintained new features added contains several sensitive algorithms especially discipline clock misbehave synchronized servers use different algorithms software ported almost every computing platform including personal computers runs daemon called ntpd unix service windows reference clocks supported offsets filtered analysed way remote servers although usually polled frequently implementation audited 2017 finding numerous potential security issues simple network time protocol sntp less complex implementation ntp using protocol without requiring storage state extended periods time used embedded systems applications full ntp capability required microsoft windows versions since windows 2000 include windows time service w32time ability synchronize computer clock ntp server w32time originally implemented purpose kerberos version 5 authentication protocol required time within 5 minutes correct value prevent replay attacks version windows 2000 windows xp implements sntp violates several aspects ntp version 3 standard beginning windows server 2003 windows vista compliant implementation ntp included microsoft states w32time reliably maintain time synchronization one second accuracy higher accuracy desired microsoft recommends using newer version windows different ntp implementation windows 10 windows server 2016 support 1 ms time accuracy certain operating conditions 2004 henning brauer presented openntpd ntp implementation focus security encompassing privilege separated design whilst aimed closely simpler generic needs openbsd users also includes protocol security improvements whilst still compatible existing ntp servers originally designed openbsd portable version available made available package linux package repositories new ntp client ntimed started poul-henning kamp 2014 new implementation sponsored linux foundation replacement reference implementation determined easier write new implementation scratch fix existing issues large existing code base june 2015 official release done yet ntimed synchronize clocks reliably ntimed works debian freebsd remains ported windows macos ntpsec fork reference implementation systematically security-hardened fork point june 2015 response rash compromises 2014 first production release shipped october 2017 removal unsafe features removal support obsolete hardware removal support obsolete unix variants ntpsec able pare away 75 original codebase making remainder auditable 2017 audit code showed eight security issues including two present original reference implementation ntpsec suffer eight issues remained reference implementation chrony comes default red hat distributions available ubuntu repositories chrony aimed ordinary computers unstable go sleep mode intermittent connection internet chrony also designed virtual machines much unstable environment characterized low resource consumption cost supports ptp well ntp two main components chronyd daemon executed computer starts chronyc command line interface user configuration evaluated safe incidents advantage versatility code written scratch avoid complexity code chrony written gnu general public license version 2 created richard curnow 1997 others along time currently maintained miroslav lichvar development supported red hat software day leap second event ntpd receives notification either configuration file attached reference clock remote server requirement time must appear monotonically increasing leap second inserted sequence 23:59:59 23:59:60 00:00:00 although clock actually halted event processes query system time cause increase tiny amount preserving order events negative leap second ever become necessary would deleted sequence 23:59:58 00:00:00 skipping 23:59:59 alternative implementation called leap smearing consists introducing leap second incrementally period 24 hours noon noon utc time implementation used google internally public ntp servers amazon aws security problems identified reference implementation ntp codebase ones appeared 2009 cause significant concern protocol undergoing revision review entire history january 2011 security revisions ntp specification reports cert current codebase reference implementation undergoing security audits several sources several years known high-risk vulnerabilities current released software several security concerns arose late 2014 previously researchers became aware ntp servers susceptible man-in-the-middle attacks unless packets cryptographically signed authentication computational overhead involved make impractical busy servers particularly denial service attacks ntp message spoofing used move clocks client computers allow number attacks based bypassing cryptographic key expiration services affected fake ntp messages identified tls dnssec various caching schemes dns cache bgp bitcoin number persistent login schemes 2017 security audit three ntp implementations conducted behalf linux foundation core infrastructure initiative suggested ntp ntpsec problematic chrony security standpoint ntp used distributed denial service ddos attacks small query sent ntp server return address spoofed target address similar dns amplification attack server responds much larger reply allows attacker substantially increase amount data sent target avoid participating attack servers configured ignore external queries upgraded version 4.2.7p26 later stack-based buffer overflow exploit discovered patch available december 19 2014 includes ntp version 4 releases version 4.2.8 apple concerned enough used auto-update capability first time though recent versions macos case version 10.6.8 manual fixes server version normal client users turn automatic time updating system preferences date time implementation errors basic missing return statement routine lead unlimited access systems running versions ntp root daemon systems use root daemon bsd subject flaw
[ 10242, 1541, 1030, 3592, 8211, 6681, 6682, 4638, 10271, 6689, 9251, 2085, 7208, 5166, 7214, 8238, 562, 1586, 3637, 7734, 9269, 11321, 3133, 4158, 5181, 2112, 6723, 8260, 11332, 8265, 1101, 4687, 11345, 9306, 10341, 3695, 4723, 2679, 4729, ...
Validation
10,345
9
Measuring_programming_language_popularity:measuring programming language popularity difficult determine programming languages widely used usage means varies context one language may occupy greater number programmer hours different one lines code third may utilize cpu time languages popular particular kinds applications example cobol still strong corporate data center often large mainframes fortran computational science engineering c embedded applications operating systems languages regularly used write many different kinds applications various methods measuring language popularity subject different bias measured proposed several indices published
[ 11009, 8262, 3462, 5677, 11219, 11221, 3960, 2045 ]
Validation
10,346
4
KisMAC:kismac kismac wireless network discovery tool mac os x wide range features similar kismet linux/bsd namesake program geared toward network security professionals novice-friendly similar applications distributed gnu general public license kismac free software kismac scan networks passively supported cards including apple airport airport extreme many third-party cards actively card supported mac os x cracking wep wpa keys brute force exploiting flaws weak scheduling badly generated keys supported card capable monitor mode used packet reinjection done supported card prism2 ralink cards gps mapping performed nmea compatible gps receiver attached kismac2 fork original software new gui new features works os x 10.7 10.10 64-bit longer maintained data also saved pcap format loaded programs wireshark project created led michael rossberg july 27 2007 removed project due changes german law specifically stgb section 202c prohibits production distribution security software date project lead passed geoffrey kruse maintainer kismac since 2003 active developer since 2001 kismac longer actively developed primary development relocated kismac web site offline september 2016 august 6 2007 former homepage denounces new german law kismac2 project continue development longer maintained well
[ 4580, 10788, 584, 842, 7983, 2006, 823, 7222, 10329, 8922, 10332, 9151 ]
None
10,347
9
STklos:stklos stklos scheme implementation succeeded stk interpreter based ad hoc virtual machine aims fast well light addition implementing rrs stklos supports additional libraries available package system scmpkg
[ 10083, 8262, 1799, 5612, 7983, 9875, 9877 ]
Test
10,348
4
Supply_chain_attack:supply chain attack supply chain attack cyber-attack seeks damage organization targeting less-secure elements supply network supply chain attack occur industry financial sector oil industry government sector cybercriminals typically tamper manufacturing process product installing rootkit hardware-based spying components internet security threat report powered symantec stated supply chain attacks still continues feature threat landscape increase 78 percent 2018 recent target security breach eastern european atm malware well stuxnet computer worm examples supply chain attacks supply chain management experts recommend strict control institution supply network order prevent potential damage cybercriminals supply chain system activities involved handling distributing manufacturing processing goods order move resources vendor hands final consumer supply chain complex network interconnected players governed supply demand although supply chain attack broad term without universally agreed upon definition reference cyber-security supply chain attack involves physically tampering electronics computers atms power systems factory data networks order install undetectable malware purpose bringing harm player supply chain network general sense supply chain attack may necessarily involve electronics 2010 burglars gained access pharmaceutical giant eli lilly supply warehouse drilling hole roof loading 80 million worth prescription drugs truck could also said carry supply chain attack however article discuss cyber attacks physical supply networks rely technology hence supply chain attack method used cyber-criminals generally supply chain attacks information systems begin advanced persistent threat determines member supply network weakest cyber security order affect target organization according investigation produced verizon enterprise 92 cyber security incidents analyzed survey occurred among small firms apt often gain access sensitive information physically tampering production product october 2008 european law-enforcement officials uncovered highly sophisticated credit-card fraud ring stole customer account details using untraceable devices inserted credit-card readers made china gain access account information make repeated bank withdrawals internet purchases amounting estimated 100 million losses threat supply chain attack poses significant risk modern day organizations attacks solely limited information technology sector supply chain attacks affect oil industry large retailers pharmaceutical sector virtually industry complex supply network information security forum explains risk derived supply chain attacks due information sharing suppliers states sharing information suppliers essential supply chain function yet also creates risk ... information compromised supply chain damaging compromised within organization muhammad ali nasir national university emerging sciences associates above-mentioned risk wider trend globalization stating …due globalization decentralization outsourcing supply chains numbers exposure points also increased greater number entities involved scattered around globe… cyber-attack supply chain destructive way damage many linked entities due ripple effect poorly managed supply chain management systems become significant hazards cyber attacks lead loss sensitive customer information disruption manufacturing process could damage company reputation wired reported connecting thread recent software supply chain attacks 05.03.19 surmised spread infected pirated popular compilers posted pirate websites corrupted versions apple xcode microsoft visual studio end 2013 target us retailer hit one largest data breaches history retail industry november 27 december 15 2013 target american brick-and-mortars stores experienced data hack around 40 million customers credit debit cards became susceptible fraud malware introduced pos system 1,800 stores data breach target customer information saw direct impact company profit fell 46 percent fourth quarter 2013 six months prior company began installing 1.6 million cyber security system target team security specialists monitor computers constantly nonetheless supply chain attack circumvented security measures believed cyber criminals infiltrated third party supplier gain access target main data network although officially confirmed investigation officials suspect hackers first broke target network november 15 2013 using passcode credentials stolen fazio mechanical services pennsylvania-based provider hvac systems 90 lawsuits filed target customers carelessness compensatory damages target spent around 61 million responding breach according fourth-quarter report investors believed american-israeli cyber weapon stuxnet malicious computer worm worm specifically targets systems automate electromechanical processes used control machinery factory assembly lines equipment separating nuclear material computer worm said specifically developed order damage potential uranium enrichment programs government iran kevin hogan senior director security response symantec reported majority infected systems stuxnet worm located islamic republic iran led speculation may deliberately targeting high-value infrastructure country including either bushehr nuclear power plant natanz nuclear power plant stuxnet typically introduced supply network via infected usb flash drive persons physical access system worm travels across cyber network scanning software computers controlling programmable logic controller plc stuxnet introduces infected rootkit onto plc modifying codes giving unexpected commands plc returning loop normal operation value feedback users recent years malware known suceful plotus tyupkin greendispense affected automated teller machines globally especially russia ukraine greendispenser specifically gives attackers ability walk infected atm system remove cash vault installed greendispenser may display ‘ service ’ message atm attackers right access credentials drain atm cash vault remove malware system using untraceable delete process types malware usually behave similar fashion capturing magnetic stripe data machine memory storage instructing machines withdraw cash attacks require person insider access atm technician anyone else key machine place malware atm tyupkin malware active march 2014 50 atms banking institutions eastern europe believed also spread time u.s. india china malware affects atms major manufacturers running microsoft windows 32-bit operating systems malware displays information much money available every machine allows attacker withdraw 40 notes selected cassette atm spring 2017 core code financial package m.e.doc used ukraine infected notpetya virus subsequently download subscribers hack carried provider system either hacking code provider hack re-routing download requests another server press reports time make clear supply chain attack attack vector used specified august september 2018 british airways website payment section contained code harvested customer payment data injected code written specifically route credit card information website domain baways.com could erroneously thought belong british airways comprehensive national cybersecurity initiative cyberspace policy review passed bush obama administrations respectively direct u.s. federal funding development multi-pronged approaches global supply chain risk management according adrian davis technology innovation management review securing organizations supply chain attacks begins building cyber-resilient systems supply chain resilience according supply chain risk management expert donal walters ability supply chain cope unexpected disturbances one characteristics company-wide recognition supply chain susceptible infiltration supply chain management plays crucial role creating effective supply chain resilience march 2015 conservative liberal democratic government coalition uk department business outlined new efforts protect smes cyber attacks included measures improve supply chain resilience uk government produced cyber essentials scheme trains firms good practices protect supply chain overall cyber security depository trust clearing group american post-trade company operations implemented governance vulnerability management throughout supply chain looks security along entire development lifecycle includes software coded hardware manufactured 2014 pwc report titled threat smart building cyber resilient financial institution financial services firm recommends following approach mitigating cyber attack avoid potential damage financial institution ’ bottom line reputation brand intellectual property executive team needs take ownership cyber risk specifically collaborate front understand institution defend respond cyber risks take make organization cyber resilient fireeye us network security company provides automated threat forensics dynamic malware protection advanced cyber threats advanced persistent threats spear phishing recommends firms certain principles place create resilience supply chain include april 27 2015 sergey lozhkin senior security researcher great kaspersky lab spoke importance managing risk targeted attacks cyber-espionage campaigns conference cyber security stated mitigation strategies advanced threats include security policies education network security comprehensive system administration specialized security solutions like ... software patching features application control whitelisting default deny mode
[ 7809, 9569, 3843, 11561, 971, 7117, 8978, 11186, 2041, 5563, 9791 ]
None
10,349
4
CommView:commview commview application network monitoring packet analysis decoding two editions commview standard edition ethernet networks wireless edition 802.11 networks named commview wifi application runs microsoft windows developed tamosoft privately held new zealand company founded 1998 commview puts network adapter promiscuous mode captures network traffic also supports capturing packets dial-up virtual adapters e.g adsl 3g modems well capturing loopback traffic captured traffic analyzed application displays network statistics individual packets packets decoded using protocol decoder commview wifi puts wi-fi adapters monitor mode providing functionality user experience similar commview addition wlan-specific features displaying decoding management control frames indication signal noise level per-node per-channel statistics
[ 9440, 4580, 10788, 1064, 2569, 10924, 6797, 7407, 7983, 11413, 2006, 10329, 10271 ]
Train
10,350
7
Gale_Technologies:gale technologies gale technologies formerly known lumenare networks private company headquartered santa clara ca additional offices asia backed crescendo ventures company automates companies infrastructure delivering private hybrid cloud management orchestration software also sells management solutions converged infrastructure deployments 2008 july — lumenare networks formed includes acquired intellectual property two companies quikcycle edentree technologies later renamed gale technologies 2010 2012 march — gale technologies completes acquisition virtiv technology intellectual property 2012 16 nov — dell announces acquisition gale technologies
[ 1400 ]
Test
10,351
3
MOS_Technology_6509:mos technology 6509 mos technology 6509 enhanced version popular 6502 microprocessor capable addressing 1 megabyte ram via bank switching numerous 6502-based processors could bank switching via separate logic 6509 logic on-chip 6509 reputation difficult program due bank switching scheme never fared well used ill-fated commodore cbm-ii line computers
[ 11395, 10767, 664, 10784, 4385, 7589, 11054, 3010, 2383, 3157, 6485, 10969, 9563, 5862, 1776, 5617, 7281, 7282, 7284 ]
Test
10,352
9
Ghostscript:ghostscript ghostscript suite software based interpreter adobe systems postscript portable document format pdf page description languages main purposes rasterization rendering page description language files display printing document pages conversion postscript pdf files ghostscript used raster image processor rip raster computer printers—for instance input filter line printer daemon—or rip engine behind postscript pdf viewers ghostscript also used file format converter postscript pdf converter codice_1 conversion program comes ghostscript distribution described documentation work-alike nearly functionality user interface adobe acrobat distiller product converter basically thin wrapper around ghostscript codice_2 output device supports pdf/a-1 pdf/a-2 well pdf/x-3 output ghostscript also serve back-end pdf raster image png tiff jpeg etc converter often combined postscript printer driver virtual printer pdf creators takes form language interpreter ghostscript also used general purpose programming environment ghostscript ported many operating systems including unix-like systems classic mac os openvms microsoft windows plan 9 ms-dos freedos os/2 atari tos amigaos ghostscript originally written l. peter deutsch gnu project released gnu general public license 1986 later deutsch formed aladdin enterprises dual-license ghostscript also proprietary license development fork aladdin ghostscript aladdin free public license despite name free software license forbids commercial distribution gnu ghostscript distributed gnu general public license version 8.54 2006 development branches merged dual-licensed releases still provided ghostscript currently owned artifex software maintained artifex software employees worldwide user community according artifex version 9.03 commercial version ghostscript longer freely distributed commercial purposes without purchasing license though gpl variant allows commercial distribution provided code using released gpl artifex point view aggregated software challenged court mupdf february 2013 ghostscript changed license gplv3 gnu agpl version 9.07 raised license compatibility questions example debian ghostscript guis view postscript pdf files screens scroll page forward page backward zoom text print page several sets free fonts supplied ghostscript intended metrically compatible common fonts attached postscript standard include ghostscript fonts developed postscript type 1 format converted truetype format usable current software popularly used within open-source community garamond font additionally improved upon urw core 35 fonts subsequently incorporated gnu freefont tex gyre
[ 6915, 10885, 3974, 6797, 5397, 2462, 1822, 11297, 2978, 4002, 292, 6436, 1191, 10536, 6830, 7983, 1073, 8627, 8628, 3126, 8763, 9790, 576, 73, 7626, 9166, 1877, 9192, 9320, 8426, 5612, 2798, 2290, 9714, 5492, 2045 ]
Test
10,353
2
Blazor:blazor blazor web ui framework based c razor html runs browser via webassembly blazor designed simplify task building single-page applications run browser enables web developers write .net-based web apps run client-side web browsers using open web standards blazor released apache 2 open source license part .net core 3.0 code written c visualbasic.net compiled normal .net assemblies downloaded run web browser using webassembly based .net runtime runtime compiled webassembly .net assemblies created user code interpreted runtime current implementation rather slow ahead time compiler may added later development stage
[ 482, 3462, 2474, 10284, 7983, 11221 ]
None
10,354
5
IPoE:ipoe internet protocol ethernet ipoe method delivering ip payload ethernet-based access network access network using bridged ethernet asynchronous transfer mode atm without using pppoe directly encapsulates ip datagrams ethernet frames using standard encapsulation use ipoe addresses disadvantage ppp unsuited multicast delivery multiple users typically ipoe uses dynamic host configuration protocol extensible authentication protocol provide functionality pppoe less robust manner
[ 5472, 2996 ]
Test
10,355
8
Microsoft_adCenter_Analytics:microsoft adcenter analytics microsoft adcenter analytics codenamed gatineau microsoft web analytics solution 2006 microsoft acquired deepmetrix corporation used analytics technology deliver adcenter analytics competed google analytics tied microsoft adcenter way google tied google analytics google adwords led complaints webmasters due five dollar fee sign compared lack cost use google analytics features included march 2009 microsoft announced adcenter analytics would discontinued existing accounts would operational till end 2009
[ 6576, 5524, 119 ]
None
10,356
3
TIM-100:tim-100 tim-100 ptt teller microcomputer developed mihajlo pupin institute serbia 1985 ref.lit 1 based intel microprocessors types 80x86 vlsi circuitry ram capacity max.8mb external memory floppy disks 5.25 3.50 inch ref.literature 2 3 4 multiuser multitasking operating system real-time nrt also tranos developed ptt office fig.4 tim designers m.p.institute-belgrade wikimedia
[ 9606, 6859, 10635, 7983, 7665 ]
Test
10,357
3
Macintosh_Classic_II:macintosh classic ii macintosh classic ii also sold performa 200 personal computer designed manufactured sold apple computer inc. october 1991 september 1993 like macintosh se/30 replaces classic ii powered 16 mhz motorola 68030 cpu 40 80 mb hard disk contrast predecessor limited 16-bit data bus se/30 32-bit data bus 10 mb memory ceiling slower data bus resulted classic ii 30 slower se/30 classic ii shares case earlier classic architecturally similar macintosh lc use custom ics identical used lc enabled classic ii lower component count older macs unlike lc se/30 classic ii internal processor direct slot making first slotless desktop macintosh since macintosh plus classic ii one three machines apple repackaged macintosh performa brand introduced september 1992 called performa 200 sold specifications original classic ii addition speaker grille left side enhanced sound number changes packaged software included ease desktop alternative aimed provide simpler user interface standard macintosh finder exact software included tended vary one retailer next initially offered retail price 1,250 usd classic ii last black-and-white compact macintosh last desktop macintosh include external floppy disk drive port apple discontinued support classic ii january 1 2001 processor 16 mhz 15.6672 mhz motorola 68030 32-bit internally 16-bit bus optional motorola 68882 fpu ram 2 mb expandable 10 mb using two 100 ns 30-pin simms display 9 b w screen 512 x 342 pixels audio 8-bit mono 22khz hard drive 40 80 mb floppy 1.4 mb double sided addressing 24-bit 32-bit battery 3.6 v lithium expansion connectors rear panel include adb port keyboard mouse two mini-din-8 rs-422 serial ports db-25 scsi db-19 external floppy drive two 3.5 mm minijack audio sockets audio headphone classic ii 50-pin internal expansion slot intended either fpu co-processor additional rom socket designed used purpose suitable use general expansion slot apple never produced expansion card kind slot although least one third-party fpu available fastmath classic ii applied engineering sonnet offered synchronous 16mhz asynchronous 50mhz 68882 fpu 2016 group hobbyists 68k mac liberation army forums produced expansion card sockets fpu bootable rewriteable rom
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7335, 7869, 8893, 8896, 4807, ...
Test
10,358
4
Data_architect:data architect data architect practitioner data architecture data management discipline concerned designing creating deploying managing organization data architecture data architects define data stored consumed integrated managed different data entities systems well applications using processing data way closely allied business architecture considered one four domains enterprise architecture according data management body knowledge data architect “ provides standard common business vocabulary expresses strategic data requirements outlines high level integrated designs meet requirements aligns enterprise strategy related business architecture. ” according open group architecture framework togaf data architect expected set data architecture principles create models data enable implementation intended business architecture create diagrams showing key data entities create inventory data needed implement architecture vision bob lambert describes necessary skills data architect follows
[ 7523 ]
Test
10,359
3
Sound_Blaster_Live!:sound blaster live sound blaster live pci add-on sound card creative technology limited pcs moving isa pci allowed card dispense onboard memory storing digital samples computer main memory accessing real time bus allowed much wider selection longer playing samples also included higher quality sound output levels quadrophonic output new midi synthesizer 64 sampled voices live introduced august 1998 variations design remained creative primary sound card line 2000s sound blaster live august 1998 saw introduction emu10k1 audio processor manufactured 0.35µm 3-metal-layer cmos process 2.44 million transistor asic rated 1000 mips emu10k1 featured hardware acceleration directsound eax 1.0 2.0 environmental audio extensions along high-quality 64-voice midi sample-based synthesizer integrated fx8010 dsp chip real-time digital audio effects major design change predecessor emu8000 emu10k1 used system memory accessed pci bus wavetable samples rather using expensive on-board memory possible point systems equipped far ram previously pci offered far faster efficient data transfer old isa bus integrated fx8010 32-bit programmable processor 1 kilobyte instruction memory provided real-time postprocessing effects reverb flanging chorus capability let users select pre-defined listening environment control-panel application concert hall theater headphones etc also provided hardware-acceleration eax creative environmental audio technology effect algorithms created development system integrated microsoft developer studio effects written language similar c compiled native fx8010 object code compiler fxasm sound blaster live featured higher audio quality previous sound blasters processed sound digitally every stage greater chip integration reduced analog signal losses older larger cards unfortunately digital processing brought limitations dsp internal fixed sample rate 48 khz standard ac'97 clock meaning emu10k1 always captured external audio-sources 48 khz performed sample-rate conversion 48 khz waveform output requested target rate 44.1 khz 32 khz rate-conversion step introduced intermodulation distortion downsampled output however rate-conversion applied audio signal passed effects engine sb/live great difficulty resampling audio-cd source material 44.1 khz without introducing audible distortion creative addressed concern recommending audio-recording performed exclusively 48 khz use third-party software handle desired sample-rate conversion avoid using emu10k1 sample-rate conversion sound blaster live supported multi-speaker output initially 4-speaker setup software referred 4.1 setup meaning 4 satellites subwoofer case subwoofer separate output 5.1 higher audio instead low-pass filter crossover within speaker system removes high midrange frequencies sound card output subwoofer games see 4.1 speaker system quadraphonic directsound offers subwoofer output configuration limited creative sound cards aureal ensoniq philips manufacturers made cards use four-speaker output fashion later versions live usually called live 5.1 offered 5.1-channel support adds center-channel speaker lfe subwoofer output useful movie watching dolby digital 5.1 decoded live implemented dos legacy support via ensoniq audiopci dos tsr program creative acquired ensoniq 1998 part deal made use highly-compatible isa sound card emulator newer cards fact live uses .ecw ensoniq concert wavetable files wavetable emulation dos program enables support many standards sound blaster 16 general midi adlib opl3 among others sound blaster live first sound card creative u hear recording input channel supported windows drivers additional software needed utilize analog stereo audio signal came main line directed input way one could mix available inputs midi synth one stereo signal using u hear 5.1 sound sound would downmixed stereo first creative recorder utility included sound card specifically designed take advantage u hear feature making simple matter capture streaming sound source even programs deliberately avoid providing means saving digital sounds thus freeing non-technical users complexities patching inputs outputs various software modules original sb live low noise floor time however critical design flaw limited application quadraphonic audio two s/p-dif channels provided stereo pair differed digital analog reconstruction since ac'97 chip provided internal 48 khz dac creative chose implement two identical dac pipelines front-speaker audio pair subjected different reconstruction amplification regime rear channel evidenced differently valued pull-up resistors filter-capacitors area forward ac'97 chip specifications ac'97 use different amplifier op-amps rear channel serviced separate arguably better philips uda1334 dac yet op-amp used boost signal output levels noticeably different frequency response envelope normalized front channel leaving thin quiet rear channel make matters worse rear channel op-amp inverting variety without treated leaving rear speakers phase front requiring switchover problems encountered using gold editions daughterboard 4-speaker digital-output tendency ac'97 chip fail used input source medium-impedance musical instruments removed use front channels altogether although chip could sourced cheaper ac'97 compatible products soldered place nevertheless simply redirecting front signal rear output sb live long time favorite trick computer audio enthusiasts want better sound minimum money despite problems original sb live still used well s/p-dif input/output midi input/output device network-connected digital audio workstation environments live live value original releases live family live value also known live 1024 identical full live exception color-coded plastic connectors instead gold include extended digital i/o card one version live value ct4830 deleted digital audio input edge card marked cd_spdif interface chip used digital audio original sound blaster live proprietary 9-pin mini-din connector digital output creative referred mini din connector allowed use microphone digital speakers time done value base models subsequent creative sound cards share single port s/pdif digital in/output microphone connectivity mini-din connection included subsequent sound blaster product however owners speaker systems use digital input may buy adapter creative card supported windows vista unless running 5.1 surround sound setting outside party released free drivers sound card http //kxproject.com/ drivers offer control dsp details original live including gold edition marketing strategy design faults see sound blaster live original released 1999 includes live drive ir released 2000 live added outputs center channel speaker lfe subwoofer channel card marketed sound blaster live full capabilities retail versions live used different audio chip emu10k1 emu10k1x noticeably smaller fewer pins chip accelerate directsound hardware eax sale board dell created controversy obviously marketed inferior cheaper product card identified part number sb0200/0203 later improved model emu10k1 chip restored hardware eax/directsound/directsound3d acceleration currently windows drivers available download creative website filename dell driver install pack 2_10 languages recommended recording done 48 khz sampling rate issue hardware down-sampling sound blaster live 24-bit sb0410 actually member sound blaster live family lacked emu10k1/10k2 processor stripped version audigy value snr 100 db software based eax advanced resolution dvd-audio playback dolby digital 5.1 dolby digital ex 6.1 playback proof linux operating systems using alsa sound system module used sound blaster live 24-bit snd-ca0106 module used sound blaster live snd-emu10k1 professional version made e-mu owned creative developed emu10k1 chip featured creative live products professional features included effects higher quality front-mounted drive bay panel headphone output dual mic/line inputs physical level control knobs digital coax in/out pci card drive bay mixer db precision phantom power microphones 12v asio mixer presets internal mixer rerouting 64 midi channels 32mb system ram usage sf2 gigabyte expandable winxp future expandability extra multi-out card also featured line line analogue inputs outputs balanced ¼ /6.3mm trs jacks
[ 2368, 6971, 8161, 10369, 10371, 9799, 10363, 6129, 8561, 8945, 823, 10360, 4699, 2045 ]
Test
10,360
3
Sound_Blaster_Audigy:sound blaster audigy sound blaster audigy product line sound cards creative technology flagship model audigy family used emu10k2 audio dsp improved version sb-live emu10k1 value/se editions built less-expensive audio controller audigy family available pcs pci pci express slot usb port audigy cards equipped emu10k2 ca0100 chip could process 4 eax environments simultaneously on-chip dsp native eax 3.0 advanced hd support supported stereo 5.1-channel output audio processor could mix 64 directsound3d sound channels hardware live 32 channels creative labs advertised audigy 24-bit sound card controversial marketing claim product support end-to-end playback 24-bit/96 khz audio streams audigy live shared similar architectural limitation audio transport dma engine fixed 16-bit sample precision 48 khz despite 24-bit/96 khz high-resolution dacs audigy dsp could process 16-bit/48 khz audio sources fact immediately obvious creative literature difficult ascertain even upon examination audigy spec sheets resulting class-action settlement creative later awarded us customers 35 discount creative products maximum discount 65 aside lack end-to-end path 24-bit audio dolby digital ac-3 dts passthrough s/pdif digital issues never resolved audigy card supports professional asio 1 driver interface natively making possible obtain low latencies virtual studio technology vst instruments versions audigy featured external break box connectors s/pdif midi ieee 1394 analog optical signals asio break box features attempt tap home studio market mainstream product variant sb0160 uses full emu10k2 chip ca0100 chip result quite similar feature set missing firewire port audigy se sb0570 audigy value sb0570 stripped models less expensive ca0106 audio-controller place emu10k2 ca0106 se/value limited software-based eax 3.0 upgraded software-based eax 4.0 driver update advanced resolution dvd-audio playback dolby digital 5.1 dolby digital ex 6.1 playback cards one mic line aux sources may unmuted time audigy se audigy value carry sb0570 model number possible card sold different markets different names perhaps cards sold one name later changed possible could even slightly different cards se low-profile pci card audigy family still many unsold units online retailers unlike audigy cards sound quality wavetable 64-voice synthesizer audio path analog-digital converter adc 24 bit 96 khz digital-analog converter dac 24 bit 96 khz recording 16‥24 bit 8 11.025 16 22.05 24 32 44.1 48 96 khz digital path s/pdif 24 bit 44.1 48 96 khz sound channels analog 2.1 4.1 5.1 6.1 7.1 creative multi speaker surround cmss means audigy se 7.1 cards upmix mono stereo sources 7.1 channels digital 2.1 sound blaster audigy ls sb0310 similar audigy se supports neither hardware acceleration firewire sound blaster audigy platinum ex sb0090 similar audigy es supported external break box instead standard internal version came firewire port introduced models vx sb0060 low-profile pci card audigy family suggestion readers model number listed number cards sound blaster live 5.1 series typo sound blaster audigy 2 sb0240 september 2002 featured updated emu10k2 processor called ca0102 gain access ca0151 separate chip collectively ca0102 ca0151 sometimes referred emu10k2.5 ca0102 chip alone version emu10k2 address biggest shortcoming original audigy revised dma engine allowed end-to-end high-resolution 24-bit audio playback 96 khz 6.1 channel recording 192 khz stereo however high-resolution audio achieved bypassing dsp decoded directly ca0151 chip also known p16v take advantage creative substituted ca0102 old ca0100 used audigy 1 using dsp high-resolution audiostreams resulted audigy characteristic downsampling dsp native-rate 48 khz mixing audio sources use windows vista 7 mitigate dsp sample rate conversion issue setting card 16-bit/48 khz resamples audio using much superior 32-bit float windows audio stack sending card unclear whether works use cases e.g openal audigy 2 supported 6.1 speakers improved signal-to-noise ratio snr audigy 106 vs. 100 decibels audio output supplied ac'97 codec front outputs i²s rear also featured built-in dolby digital 5.1 ex decoding improved dvd play-back ieee-1394 firewire connector present modifications except value audigy 2 3d audio capabilities received boost compared predecessors creative created eax 4.0 advanced hd standard coincide audigy 2 release chip process 64 directsound3d audio channels hardware also native support free open source openal audio api sound blaster audigy 2 zs sb0350 revision audigy 2 slightly improved signal-to-noise ratio 108 vs. 106 db dts-es extended surround dvd playback audigy 2 zs supports 7.1 speakers via 4-pole mini-jacks although used non-conventional pin side r/l line 2/3 respectively widespread card audigy series unofficial drivers 32 64-bit editions windows 10 8.x 7 vista sp2 xp sp3 available irix drivers sound blaster audigy 2 zs installed sgi fuel series workstations also cardbus version zs use notebook computers testing chain external loopback line-out1 line-in3 br sampling mode 24-bit 96 khz br measured values testing chain external loopback line-out1 line-in3 br sampling mode 24-bit 96 khz br measured values sound blaster audigy 2 zs notebook sb0530 cardbus version audigy 2 zs released fall 2004 notebook market nearly capabilities pci edition far smaller form factor reductions capability included somewhat limited midi capability compared pci version loss firewire first gaming-oriented sound hardware add-on board notebooks offered full hardware acceleration 3d audio along high-fidelity audio output quality card struggled compatibility due quality issues cardbus host chipsets many notebooks time problem also suffered companies products echo digital audio corporation indigo sound blaster audigy 2 zs video editor sb0480 external usb soundcard combined audio playback accelerated video editing 4-port usb 2.0 hub one solution featured accelerated video encoding dominofx video processing technologies audio system provided thx certified sound 24-bit eax advanced hd 5.1 7.1 surround video capture device hardware-accelerated encoding complex format real-time rather using cpu results good quality video even basic systems device used software uses standard directshow vfw interface limitation supplied software capture video must used prevents use device conjunction video camera webcam standard webcam interfaces use directshow creative made free vidcap application available website allows quick easy capture output devices captured files imported video editor application dvd authoring program sound blaster audigy 2 value sb0400 somewhat stripped version audigy 2 zs uses emu10k2.5 chip ca0108 integrate ca0102 ca0151 single piece silicon value version snr 106 db ieee-1394 firewire connector dts-es 6.1 playback however fully hardware accelerated directsound eax 4 sold cheaper companion expensive zs sound blaster audigy 2 se sb0570 similar audigy se live 24-bit edition hardware dsp part audio chip puts far load host system cpu card physically smaller audigy 2 cards designed entry-level budget sound card suggestion readers knowledge cards searched internet could find evidence retail boxes labeled audigy 2 se see numerous boxes labeled audigy se audigy value containing cards carrying sb0570 model number audigy 2 se n't seem likely would model number others unless card sold different part world different name perhaps card name changed time though could slightly different card exists somewhere sound blaster audigy 2 nx sb0300 external usb soundcard supporting 24 bit playback dsp chip also known sound blaster audigy advanced mb sb060 similar audigy 2 se software supports eax 3.0 supports 64-channel software wavetable directsound acceleration without hardware accelerated wavetable synthesis dac rated 95 db signal-to-noise ratio available integrated option dell inspiron studio xps notebooks note creative hardware necessary device entirely software solution adaptable various dacs sound blaster audigy 4 sb0610 uses ca10300 ca0108 unleaded counterpart dsp instead advanced ca10200 ca0102 unleaded counterpart external hub firewire port gold connectors board layout similar audigy 2 value snr rated 106 db sound blaster audigy 4 pro sb0380 improves sound blaster audigy 2 zs improving snr 113 db features much core technology audigy 2 zs uses ca0102 newer model uses ca10200 unleaded instead new external i/o hub superior dacs offering higher digital-to-analog audio conversion quality also allows simultaneous recording six audio channels 96 khz/24-bit still supports maximum 7.1 audio channels 96 khz/24bit stereo output 192 khz/24bit 7.1 mode supported windows xp well 6.1 speaker mode supported windows 7 windows vista sound blaster audigy 4 se sb0610vp sound blaster audigy 4 pro without remote control however uses audio dsp functionally capable audigy 2 4 series audigy 2 se features full hardware acceleration directsound eax sound blaster audigy rx sb1550 released september 2013 uses e-mu ca10300 audigy 4 dedicated 600-ohm headphone amplifier one toslink optical output pci express ×1 interface supported via plx technology bridge controller sound blaster audigy fx sb1570 released september 2013 hda card uses alc898 chip realtek includes 600-ohm amplifier sound blaster audigy fx control panel eax studio software independent line-in microphone inputs half-height expansion card pci express ×1 interface alternate independent wdm driver windows developed provide user-control emu10k1 emu10k2 chips found many audigy-branded cards kx project driver supports mixing numerous different effects real time hardware emu10k1 emu10k2 chips developed eugene gavrilov driver longer maintained regular basis original authors source code freed gplv2 license continues get contributions time time user daniel_k daniel kawakami creative forums maintenance updates keep compatibility latest version windows implements several non public fixes available creative forums blog latest version based creative audigy rx driver older audigy cards benefits drawbacks compared latest official drivers bring back cmss2 deprecated creative vista/7 openal quality reported differ significantly drivers support eax combination openal windows 10 1903 update drivers stopped working install sound soundcard neither creative audio console see card solution install latest driver audigy rx manually via *inf rest package creative programs left daniel_k package
[ 2368, 4321, 6971, 10369, 10371, 9799, 10363, 6415, 6129, 8561, 8625, 10359, 1400, 4699 ]
None
10,361
3
ARM_Cortex-A76:arm cortex-a76 arm cortex-a76 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings austin design centre cortex-a76 frontend 4-wide decode out-of-order superscalar design backend 8 execution ports pipeline depth 13 stages execution latencies 11 stages cortex-a76 serves successor cortex-a73 cortex-a75 though based clean sheet design core supports unprivileged 32-bit applications privileged applications must utilize 64-bit armv8-a isa also supports load acquire ldapr instructions armv8.3-a dot product instructions armv8.4-a pstate speculative store bypass safe ssbs bit speculation barriers csdb ssbb pssbb instructions armv8.5-a arm announced 25 35 increases integer floating point performance respectively memory bandwidth increased 90 relative a75 according arm a76 expected offer twice performance a73 targeted beyond mobile workloads performance targeted laptop class including windows 10 devices competitive intel kaby lake cortex-a76 support arm dynamiq technology expected used high-performance cores used combination cortex-a55 power-efficient cores cortex-a76 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a76 used within high-end kryo 495 snapdragon 8cx /kryo 485 snapdragon 855 855 plus also mid-range kryo 460 snapdragon 675 kryo 470 snapdragon 730 cpus one modifications qualcomm made increasing reorder buffer increase out-of-order window size
[ 5649, 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 8250, 8253, 7745, 7747, 2635, 99, 8812, 7804, 638, 644, 8842, 146, 659, 7833, 666, 5786, 6815, 4258, 4773, 9913, 8383, 10945, 4821, 2788, 3301, 9964, 5358, 1776, 6391, 3835, 28...
None
10,362
1
Economic_and_Social_Data_Service:economic social data service economic social data service esds national data archiving dissemination service founded january 2003 funded jointly economic social research council esrc jisc july 2012 esrc announced become partner uk data service established october 1 2012 esds provides access support wide range key economic social data uk collection covers quantitative qualitative data span many different disciplines themes esds service distributed service based collaboration four key centres expertise uk data archive institute social economic research iser based university essex manchester information associated services mimas cathie marsh centre census survey research ccsr located university manchester centres work collaboration acquire process preserve disseminate wide range data across social sciences esds also provides enhanced user support training secondary use data research learning teaching communities uk data archive responsible overall direction management esds within esds four specialist data services provide value-added support follows study descriptions online documentation including questionnaires datasets accessed online free charge without registering access data requires registration uses federated access management shibboleth user authentication registered users also download explore/analyse online large growing number datasets
[]
Test
10,363
3
Sound_Blaster_16:sound blaster 16 sound blaster 16 series sound cards creative technology add-on boards pcs isa pci slot sound blaster 16 june 1992 successor sound blaster pro introduced 16-bit digital audio sampling sound blaster line sound blaster 16 also added expansion-header add-on midi-daughterboards sample-based synthesis capabilities complying general midi standard socket optional digital signal processor dubbed advanced signal processor later creative signal processor asp later csp mpu-401 compatible uart communication external midi-devices sound blaster 16 retained pro opl-3 support fm synthesis mostly compatible software written older sound blaster sound blaster pro sound cards sb16 mpu-401 emulation limited uart dumb mode sufficient midi software daughterboard wave blaster roland scb-7 roland scb-55 yamaha db50xg yamaha db60xg installed sound blaster wave blaster behaved like standard midi device accessible mpu-401 compatible midi software asp csp chip added new features sound blaster line hardware-assisted speech synthesis textassist software qsound audio spatialization technology digital pcm wave playback pcm audio compression decompression software needed written leverage unique abilities yet offered capabilities lacked compelling applications result chip generally ignored market sound blaster 16 featured widely used tea2025 amplifier ic configuration creative chosen would allow approximately 700 milliwatts 0.7 watts per channel used standard pair unpowered 4-ohm multi-media speakers later models typically ones vibra chips used also then-widely used tda1517 amplifier ic setting onboard jumper user could select line-level output bypassing on-board amplifier amplified-output sound blaster 16 hugely popular creative audio revenue grew us 40 million per year nearly us 1 billion following launch sound blaster 16 related products rich sorkin general manager global business time responsible product planning product management marketing oem sales due popularity wide support sound blaster 16 emulated variety virtualization and/or emulation programs dosbox qemu bochs vmware virtualbox varying degrees faithfulness compatibility early intel pcs built ibm pc/at typically included support one ata interface controlled two ata devices computer needs grew became common system need 1 ata interface development cd-rom many computers could support since devices one channel already used sound blaster 16 boards ct2940 example provided additional ide interface computers spare ata-ports cdrom though additional drive interface typically supported one device rather two typically supported cd rom drives usually could support additional hard drives proprietary cd-rom standards also supported several sound blaster 16 cards mitsumi ct2700 philips/lmsi ct1780 example sound blaster 16 cards came panasonic matsushita interface resembles ide 40pin connector sound blaster scsi controller sb 16 scsi-2 ct1770 ct1779 designed use high end scsi based cd-rom drives controller on-board firmware boot bios start os scsi hard drive normally meant scsi device id-0 id-1 used well computer scsi hard drive required scsi controller settings scsi controller sb card selected sb scsi-2 interface conflict main scsi controller sound blaster 16 cards feature connectors cd-audio input necessity since operating systems cd-rom drives time support streaming cd-audio digitally main interface cd-audio input could also daisy-chained another sound generating device mpeg decoder tv tuner card majority sound blaster 16 cards feature either discrete yamaha ymf262 opl-3 fm synthesizer ct1747 chip synthesizer integrated post-1995 cards notably ct2910 feature fully compatible ymf289 fm synthesis chip instead starting late 1995 creative utilized cost-reduced software-compatible replacement opl-3 fm support termed cqm synthesis however synthesis far entirely faithful opl-3 chips producing considerable distortion along high-pitched 'squeaking 'ringing artifacts fm-synthesized music sound effects boards utilizing cqm synthesis feature ct1978 chip may cqm integrated case vibra16c/x-based boards following model numbers assigned sound blaster 16 note various pcbs model number shipped different configuration regarding cd-rom interfaces sockets presence/absence asp/csp chip following models typically equipped asp/csp socket ct1740 ct1750 ct1770 ct1790 ct2230 ct2740 ct2950 ct2290 sound blaster easy 16 ct2750 sold asp/csp chip parallel cd-rom port 1 audio sound blaster vibra 16 released cost-reduced integrated sound blaster 16 chipset targeting oems entry-level mid-range markets variants support plug play microsoft windows operating systems lacked separate bass treble control asp/csp socket models even lacked wave blaster connector came equipped connector several different revisions vibra chipset exist following model numbers assigned sound blaster vibra 16 note various pcbs model number shipped different configuration regarding cd-rom interfaces sockets even among models variations exist example oem-specific cards made without tea2025/tda1517 amplifier reduce costs sound blaster 16 waveffects released 1997 cheaper simpler redesign sound blaster 16 came creative wavesynth also bundled sound blaster awe64 gold physical modeling software synthesizer developed seer systems led dave smith based sondius waveguide technology developed stanford ccrma waveffects line also supports cqm synthesis adlib/opl compatibility following model numbers assigned sound blaster 16 waveffects 1998 creative technology acquired ensoniq subsequently released sound blaster 16 pci sound blaster 16 pci based ensoniq audiopci technology therefore unrelated isa sound blaster 16 sound blaster 16 vibra sound blaster 16 waveffects dedicated hardware adlib/opl support instead using ensoniq sample-synthesis engine simulate though simulation considered inaccurate compared original opl chips fortunately general midi compatible games following model numbers assigned sound blaster 16 pci many sound blaster 16s well 20 years old many cards suffer symptoms related aging capacitors ranging muffled distorted output cards failing function properly addition regard headphone amplifier design boards creative fully adhere datasheets recommendations component values potentially impacting amplified output sound quality users found replacing capacitors fresh ones recommended values noticeably improved amplified line-level audio quality addition restoring proper operation large number sound blaster 16 cards flawed digital sound processor board causes various issues midi daughtercards attached wave blaster header problems include stuck notes incorrect notes various flaws midi playback particular sound blaster 16 cards affected carry dsp versions 4.11 4.12 4.13 dsp versions 4.16 later older dsp versions 4.05 suffer bug workaround flaw occurs operating systems since issue hardware level dsp version checked running diagnose utility dos looking dsp chip sound card version number printed ct1740a chip usually near ct1745a mixer chip computer gaming world 1993 stated impressed quality digital audio sound blaster 16 16 asp reporting pops extra noise incomplete sound blaster compatibility magazine instead recommended almost foolproof sound blaster pro original sound blaster
[ 2368, 6971, 10369, 10371, 5702, 9799, 683, 6797, 7983, 6129, 8561, 8625, 8439, 10360, 4699, 10359 ]
None
10,364
4
Memory-scraping_malware:memory-scraping malware memory-scraping malware ram scrapping malware malware scans memory digital devices notably point-of-sale pos systems collect sensitive personal information credit card numbers personal identification numbers pin purpose exploitation magnetic stripe payment cards hold three different data trackstrack 1 track 2 track 3 pos ram scrapers created implement use expression matches gain access collect track 1 track 2 card data ram process memory ram scrapers use luhn algorithm check validity card data exfiltration
[ 6091, 9102, 8206, 7441, 9242, 7515 ]
None
10,365
3
Macintosh_Quadra_800:macintosh quadra 800 macintosh quadra 800 also sold bundled server software apple workgroup server 80 personal computer part apple computer quadra series macintosh computers introduced february 1993 alongside first macintosh centris models first totally new quadra model since original quadras 700 900 950 positioned 950 previous midrange quadra 700 discontinued shortly 800 introduction debuting half price 950 800 featured motorola 68040 33 mhz processor 950 additional interleaved ram running 70ns well enhanced video system scsi bus enabled outperform 950 however tower case smaller much less accessible giving reputation one apple worst cases time quadra 800 later joined multimedia-focused quadra 840av quadra 800 discontinued march 1994 favor powerpc-based power macintosh 8100 8100 successor power macintosh 8500 used quadra 800 case european version power macintosh 7200 marketed power macintosh 8200 taller highly-modified variant case also used power macintosh 9500 case apple introduced new mini-tower case design quadra 800 subsequently used quadra 840av power macintosh 8100 8200 8500 infoworld review quadra 800 described case design follows apple recommends take machine authorized dealer install additional memory ’ wonder — procedure fraught difficulties although bad previous compact models se order access simm slots need detach logic board ’ plastic holders easily broken flip board access slots boards machine need remove try put back together may find internal scsi connections come loose video logic board 512 kb on-board vram sufficient provide 256-color 8-bit support monitors 16 inches size two vram simm slots provide ability upgrade 1 mb vram allows 32,768 color 16-bit resolutions quadra 800 capable operating 24-bit color regardless much vram installed whether external video card used david pogue described apple deliberately crippling machine enhance attractiveness quadra 900 950 models cd-rom configurations included applecd 300i 2x cd-rom quadra 800 one first macintoshes shipped bootable cd-rom configurations include external scsi port two adb two serial ports 3 nubus slots processor direct slot mono audio stereo audio inclusion aaui ethernet port varied region newly-introduced apple desktop bus mouse ii included configurations introduced february 10 1993 introduced march 22 1993
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 3167, 9312, 8806, 6258, 10357, 4220, 10878, 6783, 4741, 7305, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 6314, 7869, 8893, 8896, ...
None
10,366
4
Principal_(computer_security):principal computer security principal computer security entity authenticated computer system network referred security principal java microsoft literature principals individual people computers services computational entities processes threads group things need identified authenticated assigned rights privileges resources network principal typically associated identifier security identifier allows referenced identification assignment properties permissions
[ 929, 3723, 5677, 8080, 4663, 7804, 2558 ]
Test
10,367
1
Tablespace:tablespace tablespace storage location actual data underlying database objects kept provides layer abstraction physical logical data serves allocate storage dbms managed segments database segment database object occupies physical space table data indexes created tablespace referred name creating database segments tablespaces specify database storage locations logical database structure database schema instance different objects schema may different underlying tablespaces similarly tablespace may service segments one schema sometimes used specify schema form bond logical physical data using tablespaces administrator also control disk layout installation common use tablespaces optimize performance example heavily used index placed fast ssd hand database table contains archived data rarely accessed could stored less expensive slower magnetic hard drive common tablespaces store data filesystem file single file must part single tablespace database management systems allow tablespaces configured directly operating-system device entries called raw devices providing better performance avoiding os filesystem overheads oracle stores data logically tablespaces physically datafiles associated corresponding tablespace
[ 10340, 10737, 9010, 2901, 2456, 8539 ]
Test
10,368
7
Content_delivery_network:content delivery network content delivery network content distribution network cdn geographically distributed network proxy servers data centers goal provide high availability high performance distributing service spatially relative end-users cdns serve large portion internet content today including web objects text graphics scripts downloadable objects media files software documents applications e-commerce portals live streaming media on-demand streaming media social media sites cdns layer internet ecosystem content owners media companies e-commerce vendors pay cdn operators deliver content end users turn cdn pays isps carriers network operators hosting servers data centers cdn umbrella term spanning different types content delivery services video streaming software downloads web mobile content acceleration licensed/managed cdn transparent caching services measure cdn performance load balancing multi cdn switching analytics cloud intelligence cdn vendors may cross industries like security ddos protection web application firewalls waf wan optimization cdn nodes usually deployed multiple locations often multiple backbones benefits include reducing bandwidth costs improving page load times increasing global availability content number nodes servers making cdn varies depending architecture reaching thousands nodes tens thousands servers many remote points presence pops others build global network small number geographical pops requests content typically algorithmically directed nodes optimal way optimizing performance locations best serving content user may chosen may measured choosing locations fewest hops lowest number network seconds away requesting client highest availability terms server performance current historical optimize delivery across local networks optimizing cost locations least expensive may chosen instead optimal scenario two goals tend align edge servers close end-user edge network may advantage performance cost cdn providers provide services varying defined set pops depending coverage desired united states international global asia-pacific etc sets pops called edges edge nodes edge networks would closest edge cdn assets end user cdn edge network grows outward origins acquisitions via purchase peering exchange co-locations facilities bandwidth servers cdn providers profit either direct fees paid content providers using network profit user analytics tracking data collected scripts loaded onto customer websites inside browser origin services pointed potential privacy intrusion purpose behavioral targeting solutions created restore single-origin serving caching resources cdn networks serving javascript also targeted way inject malicious content pages using sub-resource integrity mechanism created response ensure page loads script whose content known constrained hash referenced website author internet designed according end-to-end principle principle keeps core network relatively simple moves intelligence much possible network end-points hosts clients result core network specialized simplified optimized forward data packets content delivery networks augment end-to-end transport network distributing variety intelligent applications employing techniques designed optimize content delivery resulting tightly integrated overlay uses web caching server-load balancing request routing content services techniques briefly described web caches store popular content servers greatest demand content requested shared network appliances reduce bandwidth requirements reduce server load improve client response times content stored cache web caches populated based requests users pull caching based preloaded content disseminated content servers push caching server-load balancing uses one techniques including service-based global load balancing hardware-based i.e layer 4–7 switches also known web switch content switch multilayer switch share traffic among number servers web caches switch assigned single virtual ip address traffic arriving switch directed one real web servers attached switch advantage balancing load increasing total capacity improving scalability providing increased reliability redistributing load failed web server providing server health checks content cluster service node formed using layer 4–7 switch balance load across number servers number web caches within network request routing directs client requests content source best able serve request may involve directing client request service node closest client one capacity variety algorithms used route request include global server load balancing dns-based request routing dynamic metafile generation html rewriting anycasting proximity—choosing closest service node—is estimated using variety techniques including reactive probing proactive probing connection monitoring cdns use variety methods content delivery including limited manual asset copying active web caches global hardware load balancers several protocol suites designed provide access wide variety content services distributed throughout content network internet content adaptation protocol icap developed late 1990s provide open standard connecting application servers recently defined robust solution provided open pluggable edge services opes protocol architecture defines opes service applications reside opes processor executed remotely callout server edge side includes esi small markup language edge level dynamic web content assembly fairly common websites generated content could changing content like catalogs forums personalization creates problem caching systems overcome problem group companies created esi peer-to-peer p2p content-delivery networks clients provide resources well use means unlike client-server systems content centric networks actually perform better users begin access content especially protocols bittorrent require users share property one major advantages using p2p networks makes setup running costs small original content distributor content owners satisfied options costs commercial cdn service create cdn called private cdn private cdn consists pops points presence serving content owner pops caching servers reverse proxies application delivery controllers simple two caching servers large enough serve petabytes content large content distribution networks may even build set private network distribute copies content across cache locations private networks usually used conjunction public networks backup option case capacity private network enough failure leads capacity reduction since content distributed across many locations variety multicasting techniques may used reduce bandwidth consumption private networks also proposed select multicast trees according network load conditions efficiently utilize available network capacity rapid growth streaming video traffic uses large capital expenditures broadband providers order meet demand retain subscribers delivering sufficiently good quality experience address telecommunications service providers tsps begun launch content delivery networks means lessen demands network backbone reduce infrastructure investments networks video content transmitted telco cdns advantages traditional cdns last mile deliver content closer end user cached deep networks deep caching minimizes distance video data travels general internet delivers quickly reliably telco cdns also built-in cost advantage since traditional cdns must lease bandwidth build operator margin cost model addition operating content delivery infrastructure telco operators better control utilization resources content management operations performed cdns usually applied without limited information network e.g. topology utilization etc telco-operators interact business relationships pose number challenges telco-operators limited sphere actions face impact operations utilization resources contrast deployment telco-cdns allow operators implement content management operations enables better control utilization resources provide better quality service experience end users june 2011 streamingmedia.com reported group tsps founded operator carrier exchange ocx interconnect networks compete directly large traditional cdns like akamai limelight networks extensive pops worldwide way telcos building federated cdn offering interesting content provider willing deliver content aggregated audience federation likely near future telco cdn federations created grow enrollment new telcos joining federation bringing network presence internet subscriber bases existing ones august 2011 global consortium leading internet service providers led google announced official implementation edns-client-subnet ietf internet-draft intended accurately localize dns resolution responses initiative involves limited number leading dns cdn service providers edns-client-subnet edns0 option recursive dns servers cdns utilize ip address requesting client subnet resolving dns requests cdn relies ip address dns resolver instead client resolving dns requests incorrectly geo-locate client client using google anycast addresses dns resolver create latency problems initially google 8.8.8.8 dns addresses geo-located california potentially far location requesting client google public dns servers available worldwide generally speaking internet service providers provide content delivery network
[ 4224, 257, 7937, 8833, 9091, 9601, 7304, 9358, 1935, 10900, 4120, 154, 10522, 1692, 7708, 9117, 10270, 8608, 10782, 6435, 9508, 1959, 5543, 6311, 7722, 9262, 64, 448, 8640, 1091, 9408, 4549, 1223, 2887, 9543, 331, 5067, 9675, 10316, 3152,...
Validation
10,369
3
Sound_Blaster_AWE64:sound blaster awe64 sound blaster advanced wave effects 64 isa sound card creative technology add-on board pcs card launched november 1996 sound blaster awe64 significantly smaller predecessor sound blaster awe32 offers similar feature set also notable improvements awe64 support greater polyphony awe32 unfortunately additional voices achieved via software-based processing system cpu technology called waveguide synthesizes instrument sounds rather using stored instrument patches like hardware voices demands processing power host system also equal quality available soundfonts inability adjust synthesis parameters unlike hardware portion awe64 also limited waveguide function usefulness another improvement comes better on-board circuitry increases signal-to-noise ratio overall signal quality compared frequently quite noisy awe32 sound blaster 16 boards improvement notable awe64 gold superior gold plated rca connector outputs improvement also comes increased integration components awe64 compared predecessors increased integration means board simpler trace routing components reduced decreasing amount noise-inducing signal travel also made possible reduce size awe64 board noticeably compared awe32 sound blaster awe32 boards allowed sample ram expansion installation 30-pin fast-page dram simms simms commodity items time awe32 awe64 used many applications including plain system ram creative control sale awe64 creative moved proprietary ram expansion modules manufactured sold memory boards priced rather high limited production also made quite difficult expand awe64 ram capacity since awe64 left production awe64 end basically revision awe32 quality components output improved cost manufacturing lessened functionality hardware nearly identical boards based around awe32 e-mu 8000 sample-based synthesis chipset e-mu effects processor creative audio dsp codec digital sound playback awe64 came two versions initially standard version later re-branded value 512kb ram gold version 4mb ram high quality 20-bit dac separate spdif output earlier revision standard value versions card ie model ct4500 all-black jacks later revision model ct4520 ac ’ 97 color coded jacks third version arrived later designed around pci bus offers features original isa awe64 pci interface built around even integrated asic made board even compact thus cheaper build unfortunately card time issue compatibility older legacy dos applications accessing pci audio cards ideally addressed creative created motherboard port called sb-link assisted pci bus working software looked legacy i/o resources isa sound cards without motherboard port card incompatible dos software awe64 pci later followed awe64d variant pci awe64 developed oems offered feature support awe64 cards including dos support issues awe64d quite compatible awe64 pci drivers however use separate driver packages awe64 mark ii also designed prototype boards drivers made card added 4 speaker surround sound games hardware dolby digital decoder six extra phono plugs sub center left rear right rear digital digital pass-through extra dolby decoder chips placed second board connected main board via ribbon cable project dropped favor sound blaster live cards due high expense solution aging isa interface response creative move towards proprietary memory module jeff briden created adapter board plugged awe64 allowed user install normal 30-pin simms awe-simm available several years starting 1998 longer available 1998 beijing luck star power machines co ltd. designed adapter board named simmconn could plugged awe64 allowed install single 72-pin simm module adapter came two variants simmconn value designed awe64 awe64 value simmconn gold designed awe64 gold although adapters longer ordered design manufacturing files remain available download personal non-commercial use
[ 2368, 6971, 10371, 9799, 10363, 6129, 8561, 10359, 10360, 4699 ]
None
10,370
8
GoAccess:goaccess goaccess open-source web analytics application unix-like operating systems text-based web application user interface provide real-time analytics continuously monitoring web server logs https //geekflare.com/monitor-analyze-access-logs-goaccess/
[ 225, 823, 7983, 6576, 119, 5397, 1943, 2045 ]
Test
10,371
3
Sound_Blaster_AWE32:sound blaster awe32 sound blaster awe32 isa sound card creative technology expansion board pcs part sound blaster family products sound blaster awe32 introduced march 1994 near full-length isa sound card measuring 14 inches 356 mm length due number features included awe32 digital audio section basically entire sound blaster 16 compatible creative earlier sound blaster 2.0 minus c/ms audio chips specifications included 16-bit 44.1 khz ad/da conversion real-time on-board compression decompression yamaha opl3 fm synthesizer chip however compatibility always perfect situations various bugs could arise games many sound blaster awe32 cards codecs supported bass treble gain adjustments creative included mixer software many variants revisions awe32 however numerous variations audio chipset amplifier selection design supported features example sound blaster awe32 boards utilize vibra chip bass treble adjustments sound blaster awe32 included two distinct audio sections one creative digital audio section audio codec optional csp/asp chip socket second e-mu midi synthesizer section synthesizer section consisted emu8000 synthesizer effects processor chip 1 mib emu8011 sample rom variable amount ram none sb32 512 kib awe32 ram expandable 28 mib cards chips comprised powerful flexible sample-based synthesis system based e-mu high-end sampler systems e-mu emulator iii e-mu proteus effects processor generated various effects i.e reverb chorus environments midi output similar later eax standard live newer cards also add effects output yamaha opl-3 fm synthesis awe32 first sampler support e-mu soundfont standard allowed users build custom sound sets using samples samples included rom card sold software building custom soundfonts creative subsequent cards sound blaster pci64/128 series support soundfonts initial release creative promoted emu8000 waveguide physical modelling synthesis engine due ability work delay lines option used mostly effect engine chorus flanging effects actual physical modeling instruments popular awe although support exists soundfont format awe32 n't use mpu-401 port access emu8000—creative decided expose emu8000 registers directly three sets non-standard ports interpret midi commands software host cpu gravis ultrasound software designers write special awe32 support programs support older software awe32 featured opl-3 fm synthesis came aweutil program attempted provide gm/mt-32/gs redirection native awe hardware however aweutil n't compatible programs motherboards due use non-maskable interrupt feature omitted disabled many clone boards used lot precious dos conventional memory also game used dos 32-bit protected mode non-dpmi compliant dos extender mpu-401 emulation would function emu8000 would used unless directly supported software affect creative wave blaster daughterboard header awe32 usage windows simplified fact windows 3.1x drivers made opl3 emu8000 appear like another midi peripheral midi interfaces sound blaster awe32 value another value-oriented offering lacked simm slots asp processor featured 512kb onboard ram empty asp chip socket also awe32 panasonic/sony/mitsumi cd-rom interface support proprietary non-atapi cd-rom drives wave blaster header two 30-pin simm slots increase sample memory later sound blaster awe32 revisions replaced proprietary cd-rom interfaces atapi interface sound blaster awe32 supported 28 mb additional simm memory maximum 32 mb could added sound blaster awe32 synthesizer could address 4mb emu8000 address space reserved sample rom following model numbers assigned sound blaster awe32 sound blaster 32 sb32 value-oriented offering creative announced june 6 1995 designed fit awe32 value lineup sb32 lacked onboard ram wave blaster header csp socket boards also used vibra integrated audio chips lacked adjustments bass treble gain sb32 midi capabilities awe32 30-pin simm ram expansion capability board also fully compatible awe32 option software used windows drivers sb32 outfitted 30-pin simms sampler section performed identically awe32 opl-3 support varied among models ct3930 came yamaha ymf262 opl-3 fm synthesis chip whereas models feature cqm synthesis either integrated vibra chip via external ct1978 chip majority sound blaster 32 cards used tda1517 amplifiers sound blaster 32 pnp onboard 512kb ram sold awe32 oem dell computers following model numbers assigned sound blaster 32
[ 2368, 6971, 10369, 5702, 9799, 683, 10363, 6510, 6415, 400, 6129, 8561, 10359, 10360, 4699, 1660, 1247 ]
None
10,372
4
Robert_Slade:robert slade robert michael slade also known robert m. slade rob slade canadian information security consultant researcher instructor author robert slade guide computer viruses software forensics dictionary information security co-author viruses revealed slade author thousands technical book reviews today published techbooks mailing list risks digest archived internet review project expert computer viruses malware also mr. slade mr. slade lists slade married gloria j. slade edits much work editor slade book reviews grandchildren appear field every review 2008 rob grandpa ryan trevor devon hannah holds bachelor degree university british columbia master computer information science education university oregon diploma christian studies regent college slade became one small number researchers called world experts malware fred cohen named slade early work organizing computer viruses software bbses book reviews mr. slade lists slade one fewer thirty people worldwide credited contributions final version virus-l faq usenet group comp.virus virus-l mailing list public group record computer virus issues 1988 1995 1996 maintained antiviral software evaluation faq quick reference users seeking antivirus software vendor contacts list contributor well least three group computer virus faqs web came prominence written two books viruses sole author robert slade guide computer viruses first published 1994 2nd edition 1996 co-wrote viruses revealed david harley urs gattiker 2001 slade advanced field computer forensics antivirus research found intentions identity virus authors discovered program code created first course ever offered forensic programming book software forensics published 2004 chapter subject print information security management handbook fifth edition today slade consultant businesses government—among client list fortune 500 companies government canada—as well educational institutions created curricula taught courses simon fraser university macdonald dettwiler university phoenix slade creates seminars local federal international training groups senior instructor isc ² develops courses information security quality assurance qa seek certification slade one world approximately 60,000 cissps certification used private industry well least united states government defense slade moved online security glossary 2006 book dictionary information security virus bulletin remarked unusual collection five forewords many acknowledged experts willing contribute says something author standing field —the forewords written fred cohen jack holleran peter g. neumann harold tipton gene spafford dictionary considered dependable baseline definitions citable common source slade surveyed literature field shared knowledge internet review project published book reviews perhaps widely known reviews works gave first priority information security reviews often critical—to project faq question n't like books slade replied may cruel fair
[ 9051, 9283, 10307, 8613, 8155, 9319, 3342, 7515, 7739, 5373 ]
Validation
10,373
2
OpenCable_Application_Platform:opencable application platform opencable application platform ocap operating system layer designed consumer electronics connect cable television system java-based middleware portion platform unlike operating systems personal computer cable company controls ocap programs run consumer machine designed cablelabs cable networks north america ocap programs intended interactive services ecommerce online banking electronic program guides digital video recording cable companies required ocap part cablecard 2.0 specification proposal controversial approved federal communications commission cable companies stated two-way communications third party devices networks require support ocap consumer electronics association groups argue ocap intended block features compete cable company provided services consumers entitled add delete otherwise control programs personal computers january 8 2008 cablelabs announced tru2way brand opencable platform including ocap application platform ocap java based software/middleware portion opencable initiative ocap based globally executable mhp gem -standard defined cablelabs ocap based gem lot common multimedia home platform mhp -standard defined dvb project present two versions ocap standard exist
[ 3561, 5677, 7983, 8882, 8122 ]
Test
10,374
1
REAL_Server:real server real server relational database management system rdbms built top sqlite database engine real server evolved sqliteserver originally developed sqlabs 2004 may 2005 real software inc. creator realbasic purchased source code copyrights sqliteserver invested development 2007/2008 first version real sql server released new version released april 2009 renamed real server september 2010 sqlabs repurchased server intellectual properties new major release development sqlabs team real server used following
[ 10048, 8644, 6797, 10413, 823 ]
Validation
10,375
3
Bobcat_(microarchitecture):bobcat microarchitecture amd bobcat family 14h microarchitecture created amd amd apus aimed low-power/low-cost market revealed speech amd executive vice-president henri richard computex 2007 put production q1 2011 one major supporters executive vice-president mario a. rivas felt difficult compete x86 market single core optimized 10–100 w range actively promoted development simpler core target range 1–10 w. addition believed core could migrate hand-held space power consumption reduced less 1 w. bobcat cores used together gpu cores accelerated processing units apus fusion brand simplified architecture diagram released amd analyst day november 2009 similar concept earlier amd research 2003 detailing specifications advantages extending x86 everywhere bobcat x86 cpu core design since completed implemented amd apu processor products tdp 18 w less core targeted low-power markets like netbooks/nettops ultra-portable laptops consumer electronics embedded market since launch bobcat-based cpus also used oems larger laptops architecture specifics february 2013 amd detailed plans successor bobcat codenamed jaguar january 2011 amd introduced several processors implemented bobcat core core following amd accelerated processors e-series c-series standard parts g-series embedded parts
[ 3586, 8322, 5380, 9092, 9475, 6151, 8327, 5645, 398, 6926, 10260, 7963, 2719, 2850, 9122, 5541, 8231, 11047, 2094, 11183, 6705, 1461, 9400, 8125, 8126, 6978, 7234, 11080, 2764, 7247, 9551, 977, 7122, 9427, 5844, 473, 9057, 5859, 7783, 535...
None
10,376
2
Sunwah_Linux:sunwah linux rays linux previously sun wah linux chinese debian-based linux distribution sunwah linux debian-based distribution first chinese linux distribution receive linux standard base lsb certification system architecture designed hong kong programming developed nanjing distribution sponsored sunwah group hong kong jiangsu provincial government china sunwah pearl linux abbreviated swp technology training entity group providing research assistance testing training support distribution swp joint establishment hong kong polytechnic university sunwah group 2005 sunwah linux installed 140,000 pcs primary secondary schools china april 2006 sunwah linux best linux desktop application award linuxworld conference expo boston according albert chung presented distribution judges competition fierce proud chinese linux desktop distribution recognized industry experts judges
[ 5363, 2559, 5397, 823 ]
Validation
10,377
7
Apache_Mahout:apache mahout apache mahout project apache software foundation produce free implementations distributed otherwise scalable machine learning algorithms focused primarily areas collaborative filtering clustering classification many implementations use apache hadoop platform mahout also provides java libraries common maths operations focused linear algebra statistics primitive java collections mahout work progress number implemented algorithms grown quickly various algorithms still missing mahout core algorithms clustering classification batch based collaborative filtering implemented top apache hadoop using map/reduce paradigm restrict contributions hadoop-based implementations contributions run single node non-hadoop cluster also welcomed example 'taste collaborative-filtering recommender component mahout originally separate project run stand-alone without hadoop starting release 0.10.0 project shifted focus building backend-independent programming environment code named samsara environment consists algebraic backend-independent optimizer algebraic scala dsl unifying in-memory distributed algebraic operators supported algebraic platforms apache spark h2o apache flink support mapreduce algorithms started gradually phased 2014
[ 8460, 7567, 1296, 6161, 11535, 1047, 1913, 8217, 6555, 8860, 11161, 3877, 10661, 11303, 5677, 1327, 7983, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 11343, 4944, 1363, 7802, 8408, ...
Test
10,378
4
Trusted_path:trusted path trusted path trusted channel mechanism provides confidence user communicating user intended communicate ensuring attackers ca n't intercept modify whatever information communicated term initially introduced orange book security architecture concept implemented technical safeguards suitable particular environment risk profile common criteria european union electronic signature standards trusted path trusted channel describe techniques prevent interception tampering sensitive data passes various system components one popular techniques password stealing microsoft windows login spoofing based programs simulated operating system login prompt users try log fake login program capture user passwords later use safeguard windows nt introduced ctrl-alt-del sequence secure attention key escape third party programs invoke system login prompt similar problem arises case websites requiring authentication user expected enter credentials without actually knowing website spoofed https mitigates attack first authenticating server user using trust anchor certification path validation algorithm displaying login form
[ 2432, 8417, 8418, 4163, 4067, 8904, 6797, 8976, 9745, 4404, 10933, 1496 ]
Test
10,379
4
Dave_the_Resurrector:dave resurrector dave resurrector so-called resurrector bot responded attempts canceling message usenet newsgroup news.admin.net-abuse re-posting message written chris lewis bot notable one first escalations spam arms race
[]
Test
10,380
4
GMER:gmer gmer software tool written polish researcher przemysław gmerek detecting removing rootkits runs microsoft windows support windows nt 2000 xp vista 7 8 10 version 2.0.18327 full support windows x64 added time first release 2004 introduced innovative rootkit detection techniques quickly gained popularity effectiveness incorporated antivirus tools including avast antivirus sdfix several months 2006 2007 tool website target heavy ddos attacks attempting block downloads
[ 9791, 7515, 6797, 7983 ]
None
10,381
4
Amplitude-shift_keying:amplitude-shift keying amplitude-shift keying ask form amplitude modulation represents digital data variations amplitude carrier wave ask system binary symbol 1 represented transmitting fixed-amplitude carrier wave fixed frequency bit duration seconds signal value 1 carrier signal transmitted otherwise signal value 0 transmitted digital modulation scheme uses finite number distinct signals represent digital data ask uses finite number amplitudes assigned unique pattern binary digits usually amplitude encodes equal number bits pattern bits forms symbol represented particular amplitude demodulator designed specifically symbol-set used modulator determines amplitude received signal maps back symbol represents thus recovering original data frequency phase carrier kept constant like ask also linear sensitive atmospheric noise distortions propagation conditions different routes pstn etc ask modulation demodulation processes relatively inexpensive ask technique also commonly used transmit digital data optical fiber led transmitters binary 1 represented short pulse light binary 0 absence light laser transmitters normally fixed bias current causes device emit low light level low level represents binary 0 higher-amplitude lightwave represents binary 1 simplest common form ask operates switch using presence carrier wave indicate binary one absence indicate binary zero type modulation called on-off keying ook used radio frequencies transmit morse code referred continuous wave operation sophisticated encoding schemes developed represent data groups using additional amplitude levels instance four-level encoding scheme represent two bits shift amplitude eight-level scheme represent three bits forms amplitude-shift keying require high signal-to-noise ratio recovery nature much signal transmitted reduced power ask system divided three blocks first one represents transmitter second one linear model effects channel third one shows structure receiver following notation used different symbols represented different voltages maximum allowed value voltage possible values range −a given difference one voltage considering picture symbols v n generated randomly source impulse generator creates impulses area v n impulses sent filter ht sent channel words symbol different carrier wave sent relative amplitude transmitter signal expressed form receiver filtering hr signal use notation indicates convolution two signals a/d conversion signal z k expressed form relationship second term represents symbol extracted others unwanted first one effect noise third one due intersymbol interference filters chosen g satisfy nyquist isi criterion intersymbol interference value sum zero transmission affected noise probability density function error given size modelled gaussian function mean value relative sent value variance given formula_9 spectral density noise within band hr f continuous fourier transform impulse response filter hr f probability making error given example formula_11 conditional probability making error given symbol v0 sent formula_12 probability sending symbol v0 probability sending symbol represent probability density functions plot possible value voltage transmitted get picture like particular case formula_14 shown probability making error single symbol sent area gaussian function falling functions symbols shown cyan one call formula_15 area one side gaussian sum areas formula_16 total probability making error expressed form calculate value formula_15 order move origin reference wherever want area function change situation like one shown following picture matter gaussian function considering area want calculate value looking given following integral formula_20 complementary error function putting results together probability make error formula_21 formula easily understand probability make error decreases maximum amplitude transmitted signal amplification system becomes greater hand increases number levels power noise becomes greater relationship valid intersymbol interference i.e formula_22 nyquist function
[ 3040, 1121, 5664, 7490, 3140, 7108, 8160, 11686, 2920, 7400, 1550, 2994, 2968, 5020, 5304 ]
Test
10,382
2
Dm-cache:dm-cache dm-cache component specifically target linux kernel device mapper framework mapping block devices onto higher-level virtual block devices allows one fast storage devices flash-based solid-state drives ssds act cache one slower storage devices hard disk drives hdds effectively creates hybrid volumes provides secondary storage performance improvements design dm-cache requires three physical storage devices creation single hybrid volume dm-cache uses storage devices separately store actual data cache data required metadata configurable operating modes cache policies latter form separate modules determine way data caching actually performed dm-cache licensed terms gnu general public license gpl joe thornber heinz mauelshagen mike snitzer primary developers dm-cache uses solid-state drives ssds additional level indirection accessing hard disk drives hdds improving overall performance using fast flash-based ssds caches slower mechanical hdds based rotational magnetic media result costly speed ssds becomes combined storage capacity offered slower less expensive hdds moreover case storage area networks sans used cloud environments shared storage systems virtual machines dm-cache also improve overall performance reduce load sans providing data caching using client-side local storage dm-cache implemented component linux kernel device mapper volume management framework allows various mappings created physical virtual block devices way mapping devices created determines virtual blocks translated underlying physical blocks specific translation types referred targets acting mapping target dm-cache makes possible ssd-based caching part created virtual block device configurable operating modes cache policies determine dm-cache works internally operating mode selects way data kept sync hdd ssd cache policy selectable separate modules implement policies provides algorithm determining blocks promoted moved hdd ssd demoted moved ssd hdd cleaned etc configured use multiqueue mq stochastic multiqueue smq cache policy latter default dm-cache uses ssds store data associated performed random reads writes capitalizing near-zero seek times ssds avoiding i/o operations typical hdd performance bottlenecks data associated sequential reads writes cached ssds avoiding undesirable cache invalidation operations performance-wise beneficial sequential i/o operations suitable hdds due mechanical nature caching sequential i/o also helps extending lifetime ssds used caches another dm-cache project similar goals announced eric van hensbergen ming zhao 2006 result internship work ibm later joe thornber heinz mauelshagen mike snitzer provided implementation concept resulted inclusion dm-cache linux kernel dm-cache merged linux kernel mainline kernel version 3.9 released april 28 2013 dm-cache creating mapped virtual block device acts hybrid volume requires three physical storage devices internally dm-cache references origin devices number fixed-size blocks size blocks equaling size caching extent configurable creation hybrid volume size caching extent must range 32 kb 1 gb must multiple 32 kb typically size caching extent 256 1024 kb choice caching extents bigger disk sectors acts compromise size metadata possibility wasting cache space small caching extents increases size metadata metadata device kernel memory large caching extents increases amount wasted cache space due caching whole extents even case high hit rates parts operating modes supported dm-cache write-back default write-through pass-through write-back operating mode writes cached blocks go cache device blocks origin device marked dirty metadata write-through operating mode write requests returned completed data reaches origin cache devices clean blocks becoming marked dirty pass-through operating mode reads performed directly origin device avoiding cache writes go directly origin device cache write hits also cause invalidation cached blocks pass-through mode allows hybrid volume activated state cache device known consistent origin device rate data migration dm-cache performs directions i.e. data promotions demotions throttled configured speed regular i/o origin cache devices preserved decommissioning hybrid volume shrinking cache device requires use cleaner policy effectively flushes blocks marked metadata dirty cache device origin device version 4.2 linux kernel following three cache policies distributed linux kernel mainline dm-cache default uses stochastic multiqueue policy
[ 4616, 3082, 5139, 6675, 7187, 10776, 25, 10780, 4637, 10272, 10785, 3618, 9762, 6180, 5158, 7217, 8242, 9266, 9784, 10809, 10811, 576, 4161, 10817, 8772, 6213, 8268, 589, 593, 10333, 97, 4194, 6244, 5222, 10856, 8298, 4207, 7285, 9335, 21...
Test
10,383
3
VEX_prefix:vex prefix vex prefix vector extensions vex coding scheme comprising extension x86 x86-64 instruction set architecture microprocessors intel amd others vex coding scheme allows definition new instructions extension modification previously existing instruction codes serves following purposes vex prefix replaces commonly used instruction prefix bytes escape codes many cases number prefix bytes escape bytes replaced number bytes vex prefix total length vex-encoded instruction length legacy instruction code cases vex-encoded version longer shorter legacy code 32-bit mode vex encoded instructions access first 8 ymm/xmm registers encodings registers would interpreted legacy lds les instructions supported 64-bit mode two-byte vex prefix contains following components three-byte vex prefix additionally contains vex coding scheme uses code prefix consisting two three bytes added existing new instruction codes x86 architecture instructions memory operand may use modr/m byte specifies addressing mode byte three bit fields base-plus-index scale-plus-index forms 32-bit addressing encoded r/m=100 mod 11 require another addressing byte sib byte following fields use 64-bit addressing additional registers present x86-64 architecture rex prefix introduced provides additional space encoding addressing modes bit-field w expands operand size 64 bits r expands reg b expands r/m reg depending opcode format used x b expand index base sib byte however rex prefix encoded quite inefficiently wasting half 8 bits vex prefix provides compact representation rex prefix well various prefixes expand addressing mode register enumeration operand size width vex prefix initial-byte values c4h c5h opcodes lds les instructions instructions supported 64-bit mode resolve ambiguity 32-bit mode vex specification exploits fact legal lds les modrm byte form 11xxxxxx would specify register operand various bit-fields vex prefix second byte inverted ensure byte always form 32-bit mode instructions need three operands extra suffix byte specifying one two additional register operands instructions coded vex prefix five operands one operands memory operand one operands immediate constant 4 8 bits remaining operands registers avx instruction set first instruction set extension use vex coding scheme avx instructions four operands avx instruction set allows vex prefix applied instructions using simd xmm registers however vex coding scheme space applying vex prefix instructions well future instruction sets legacy simd instructions vex prefix added equivalent instructions without vex prefix following differences instructions use whole 256-bit ymm register mixed non-vex instructions leave upper half register unchanged reasons efficiency
[ 833, 2821, 9126, 5356, 5358, 1489, 499, 372, 9428, 9911, 7963, 9500, 8126, 2655 ]
None
10,384
8
FDM_Group:fdm group fdm group international professional services company headquartered london united kingdom offices leeds glasgow brighton new york city toronto reston frankfurt hong kong singapore australia china composed mostly university graduates returners work ex-military personnel 'trained fdm group academies working consultants one fdm group ’ clients primarily financial institutions banks around world listed london stock exchange constituent ftse 250 index company founded brighton rod flavell julian jacqueline divett 1991 company focused recruitment acquiring mountfield software 1995 1998 name changed fdm group reflect acquisition company began hiring training placing consultants on-site clients april 2005 fdm group floated alternative investment market raising £3m net company 2010 company completed management buyout bring company private june 2014 fdm flotation time valued £308m london stock exchange fdm group remains publicly traded london stock exchange today 2015 company opened new offices city centres leeds glasgow fdm group ’ model involves recruiting recent university graduates returners work ex-forces turn consultants clients individuals go 6–14 weeks paid training one fdm group ’ academy facilities signing two-year contract company work consultant consultants employees work site clients include mostly banking finance industry fdm group women initiative focused hiring inspiring women pursue jobs stem fields part efforts sponsored 2013 2014 2015 2016 everywoman technology awards london fdm group also ex-forces initiative began new york academy veterans initiative partnered british forces resettlement services signed ministry defence armed forces corporate covenant well us army memorandum agreement army pays programme new york fdm group sponsored wall street rocks charity concert marched veterans day parade support cause helping veterans find jobs fdm group two academies located united states one academy new york opened 2011 located 14 wall street new york new york 10005 2016 fdm group opened training center virginia located 1805 library street reston va 20190 february 2016 class action lawsuit filed united states district court southern new york grace park fdm group holdings plc fdm group inc. alleging state wage violations us fair labor standards act flsa march 2017 united states district court southern new york found favor fdm group motion dismissal finding fdm group correctly classified academy trainees non-employees therefore entitled compensation court also found termination fee stipulated training agreement signed park 30,000 constitute kickback park failed provide sufficient details regarding unpaid work april 2017 park filed appeal 2nd circuit court appeals park v. fdm group inc. case number 17-1030
[ 2859, 9055 ]
Test
10,385
4
Lumension_Security:lumension security lumension security inc. part software company ivanti lumension products include endpoint management security software providing endpoint protection vulnerability management data protection application whitelisting encryption usb security risk management lumension largely focused providing security organizations businesses 2017 lumension part merger landesk heat software create new software company called ivanti lumension founded high tech software 1991 company rebranded patchlink corporation 1999 adopted lumension name 2007 2015 frontrange lumension combined create heat software 2017 heat landesk combined create ivanti lumension products traditionally competed endpoint management security industry sophos mcafee kaspersky lab symantec trend micro among others
[ 704, 7809, 9569, 9129, 3629, 4464, 9488, 4755, 9055, 2558, 127 ]
Test